A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-3659 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1975949 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
23 Aug 2022, 18:41
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://access.redhat.com/security/cve/CVE-2021-3659 - Third Party Advisory | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 - Patch, Vendor Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1975949 - Issue Tracking, Patch, Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
First Time |
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat codeready Linux Builder Fedoraproject fedora Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux For Real Time For Nfv Redhat enterprise Linux For Real Time Tus Redhat enterprise Linux For Real Time For Nfv Tus Redhat enterprise Linux Server Aus Fedoraproject Redhat enterprise Linux Eus Redhat enterprise Linux For Real Time Redhat Redhat virtualization Host Redhat enterprise Linux Linux Redhat enterprise Linux Server Eus Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux For Power Little Endian Linux linux Kernel Redhat enterprise Linux Server Tus |
22 Aug 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-22 15:15
Updated : 2023-12-10 14:35
NVD link : CVE-2021-3659
Mitre link : CVE-2021-3659
CVE.ORG link : CVE-2021-3659
JSON object : View
Products Affected
redhat
- enterprise_linux_for_real_time_tus
- enterprise_linux_server_eus
- enterprise_linux_for_ibm_z_systems
- codeready_linux_builder
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_for_real_time
- enterprise_linux_server_tus
- enterprise_linux_eus
- enterprise_linux_for_real_time_for_nfv
- enterprise_linux_for_real_time_for_nfv_tus
- virtualization_host
- enterprise_linux_for_power_little_endian
linux
- linux_kernel
fedoraproject
- fedora