{"id":"CVE-2021-47028","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7915: fix txrate reporting\n\nProperly check rate_info to fix unexpected reporting.\n\n[ 1215.161863] Call trace:\n[ 1215.164307]  cfg80211_calculate_bitrate+0x124/0x200 [cfg80211]\n[ 1215.170139]  ieee80211s_update_metric+0x80/0xc0 [mac80211]\n[ 1215.175624]  ieee80211_tx_status_ext+0x508/0x838 [mac80211]\n[ 1215.181190]  mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e]\n[ 1215.186580]  mt7915_mac_tx_free+0x324/0x7c0 [mt7915e]\n[ 1215.191623]  mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e]\n[ 1215.196582]  mt76_dma_cleanup+0x7b0/0x11d0 [mt76]\n[ 1215.201276]  __napi_poll+0x38/0xf8\n[ 1215.204668]  napi_workfn+0x40/0x80\n[ 1215.208062]  process_one_work+0x1fc/0x390\n[ 1215.212062]  worker_thread+0x48/0x4d0\n[ 1215.215715]  kthread+0x120/0x128\n[ 1215.218935]  ret_from_fork+0x10/0x1c","modified":"2026-03-15T14:10:14.126732Z","published":"2024-02-28T09:15:39.430Z","references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e"},{"type":"FIX","url":"https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47028.json","unresolved_ranges":[{"events":[{"introduced":"5.8"},{"fixed":"5.11.21"}]},{"events":[{"introduced":"5.12"},{"fixed":"5.12.4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}