First published: Tue May 11 2021(Updated: )
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
Google Android | ||
redhat/Kernel | <5.13 | 5.13 |
ubuntu/linux | <4.15.0-151.157 | 4.15.0-151.157 |
ubuntu/linux | <5.4.0-77.86 | 5.4.0-77.86 |
ubuntu/linux | <5.8.0-59.66 | 5.8.0-59.66 |
ubuntu/linux | <5.11.0-22.23 | 5.11.0-22.23 |
ubuntu/linux | <5.13~ | 5.13~ |
ubuntu/linux | <4.4.0-219.252 | 4.4.0-219.252 |
ubuntu/linux-aws | <4.15.0-1109.116 | 4.15.0-1109.116 |
ubuntu/linux-aws | <5.4.0-1051.53 | 5.4.0-1051.53 |
ubuntu/linux-aws | <5.8.0-1038.40 | 5.8.0-1038.40 |
ubuntu/linux-aws | <5.11.0-1011.11 | 5.11.0-1011.11 |
ubuntu/linux-aws | <4.4.0-1099.104 | 4.4.0-1099.104 |
ubuntu/linux-aws | <5.13~ | 5.13~ |
ubuntu/linux-aws | <4.4.0-1135.149 | 4.4.0-1135.149 |
ubuntu/linux-aws-5.0 | <5.13~ | 5.13~ |
ubuntu/linux-aws-5.11 | <5.13~ | 5.13~ |
ubuntu/linux-aws-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-aws-5.3 | <5.13~ | 5.13~ |
ubuntu/linux-aws-5.4 | <5.4.0-1051.53~18.04.1 | 5.4.0-1051.53~18.04.1 |
ubuntu/linux-aws-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-aws-5.8 | <5.8.0-1038.40~20.04.1 | 5.8.0-1038.40~20.04.1 |
ubuntu/linux-aws-5.8 | <5.13~ | 5.13~ |
ubuntu/linux-aws-hwe | <5.13~ | 5.13~ |
ubuntu/linux-aws-hwe | <4.15.0-1109.116~16.04.1 | 4.15.0-1109.116~16.04.1 |
ubuntu/linux-azure | <5.4.0-1051.53 | 5.4.0-1051.53 |
ubuntu/linux-azure | <5.8.0-1036.38 | 5.8.0-1036.38 |
ubuntu/linux-azure | <5.11.0-1009.9 | 5.11.0-1009.9 |
ubuntu/linux-azure | <4.15.0-1121.134~14.04.1 | 4.15.0-1121.134~14.04.1 |
ubuntu/linux-azure | <5.13~ | 5.13~ |
ubuntu/linux-azure | <4.15.0-1121.134~16.04.1 | 4.15.0-1121.134~16.04.1 |
ubuntu/linux-azure-4.15 | <4.15.0-1121.134 | 4.15.0-1121.134 |
ubuntu/linux-azure-4.15 | <5.13~ | 5.13~ |
ubuntu/linux-azure-5.11 | <5.13~ | 5.13~ |
ubuntu/linux-azure-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-azure-5.3 | <5.13~ | 5.13~ |
ubuntu/linux-azure-5.4 | <5.4.0-1051.53~18.04.1 | 5.4.0-1051.53~18.04.1 |
ubuntu/linux-azure-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-azure-5.8 | <5.8.0-1036.38~20.04.1 | 5.8.0-1036.38~20.04.1 |
ubuntu/linux-azure-edge | <5.13~ | 5.13~ |
ubuntu/linux-azure-fde | <5.4.0-1051.53 | 5.4.0-1051.53 |
ubuntu/linux-azure-fde | <5.13~ | 5.13~ |
ubuntu/linux-bluefield | <5.4.0-1013.16 | 5.4.0-1013.16 |
ubuntu/linux-bluefield | <5.13~ | 5.13~ |
ubuntu/linux-dell300x | <4.15.0-1027.32 | 4.15.0-1027.32 |
ubuntu/linux-dell300x | <5.13~ | 5.13~ |
ubuntu/linux-fips | <5.13~ | 5.13~ |
ubuntu/linux-gcp | <5.4.0-1046.49 | 5.4.0-1046.49 |
ubuntu/linux-gcp | <5.8.0-1035.37 | 5.8.0-1035.37 |
ubuntu/linux-gcp | <5.11.0-1011.12 | 5.11.0-1011.12 |
ubuntu/linux-gcp | <5.13~ | 5.13~ |
ubuntu/linux-gcp | <4.15.0-1106.120~16.04.1 | 4.15.0-1106.120~16.04.1 |
ubuntu/linux-gcp-4.15 | <4.15.0-1106.120 | 4.15.0-1106.120 |
ubuntu/linux-gcp-4.15 | <5.13~ | 5.13~ |
ubuntu/linux-gcp-5.11 | <5.13~ | 5.13~ |
ubuntu/linux-gcp-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-gcp-5.3 | <5.13~ | 5.13~ |
ubuntu/linux-gcp-5.4 | <5.4.0-1046.49~18.04.1 | 5.4.0-1046.49~18.04.1 |
ubuntu/linux-gcp-5.8 | <5.8.0-1035.37~20.04.1 | 5.8.0-1035.37~20.04.1 |
ubuntu/linux-gcp-5.8 | <5.13~ | 5.13~ |
ubuntu/linux-gcp-edge | <5.13~ | 5.13~ |
ubuntu/linux-gke | <5.4.0-1046.48 | 5.4.0-1046.48 |
ubuntu/linux-gke | <5.13~ | 5.13~ |
ubuntu/linux-gke-4.15 | <5.13~ | 5.13~ |
ubuntu/linux-gke-5.0 | <5.13~ | 5.13~ |
ubuntu/linux-gke-5.3 | <5.13~ | 5.13~ |
ubuntu/linux-gke-5.4 | <5.4.0-1046.48~18.04.1 | 5.4.0-1046.48~18.04.1 |
ubuntu/linux-gke-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-gkeop | <5.4.0-1018.19 | 5.4.0-1018.19 |
ubuntu/linux-gkeop | <5.13~ | 5.13~ |
ubuntu/linux-gkeop-5.4 | <5.4.0-1018.19~18.04.1 | 5.4.0-1018.19~18.04.1 |
ubuntu/linux-gkeop-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-hwe | <5.13~ | 5.13~ |
ubuntu/linux-hwe | <4.15.0-151.157~16.04.1 | 4.15.0-151.157~16.04.1 |
ubuntu/linux-hwe-5.11 | <5.13~ | 5.13~ |
ubuntu/linux-hwe-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-hwe-5.4 | <5.4.0-77.86~18.04.1 | 5.4.0-77.86~18.04.1 |
ubuntu/linux-hwe-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-hwe-5.8 | <5.8.0-59.66~20.04.1 | 5.8.0-59.66~20.04.1 |
ubuntu/linux-hwe-5.8 | <5.13~ | 5.13~ |
ubuntu/linux-hwe-edge | <5.13~ | 5.13~ |
ubuntu/linux-ibm | <5.13~ | 5.13~ |
ubuntu/linux-ibm-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-intel-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-kvm | <4.15.0-1097.99 | 4.15.0-1097.99 |
ubuntu/linux-kvm | <5.4.0-1041.42 | 5.4.0-1041.42 |
ubuntu/linux-kvm | <5.8.0-1030.32 | 5.8.0-1030.32 |
ubuntu/linux-kvm | <5.11.0-1009.9 | 5.11.0-1009.9 |
ubuntu/linux-kvm | <5.13~ | 5.13~ |
ubuntu/linux-kvm | <4.4.0-1100.109 | 4.4.0-1100.109 |
ubuntu/linux-lowlatency | <5.13~ | 5.13~ |
ubuntu/linux-lts-trusty | <5.13~ | 5.13~ |
ubuntu/linux-lts-xenial | <4.4.0-219.252~14.04.1 | 4.4.0-219.252~14.04.1 |
ubuntu/linux-lts-xenial | <5.13~ | 5.13~ |
ubuntu/linux-oem | <5.13~ | 5.13~ |
ubuntu/linux-oem-5.10 | <5.10.0-1032.33 | 5.10.0-1032.33 |
ubuntu/linux-oem-5.10 | <5.13~ | 5.13~ |
ubuntu/linux-oem-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-oem-5.17 | <5.13~ | 5.13~ |
ubuntu/linux-oem-5.6 | <5.13~ | 5.13~ |
ubuntu/linux-oem-osp1 | <5.13~ | 5.13~ |
ubuntu/linux-oracle | <4.15.0-1078.86 | 4.15.0-1078.86 |
ubuntu/linux-oracle | <5.4.0-1048.52 | 5.4.0-1048.52 |
ubuntu/linux-oracle | <5.8.0-1033.34 | 5.8.0-1033.34 |
ubuntu/linux-oracle | <5.11.0-1010.10 | 5.11.0-1010.10 |
ubuntu/linux-oracle | <5.13~ | 5.13~ |
ubuntu/linux-oracle | <4.15.0-1078.86~16.04.1 | 4.15.0-1078.86~16.04.1 |
ubuntu/linux-oracle-5.0 | <5.13~ | 5.13~ |
ubuntu/linux-oracle-5.11 | <5.13~ | 5.13~ |
ubuntu/linux-oracle-5.13 | <5.13~ | 5.13~ |
ubuntu/linux-oracle-5.3 | <5.13~ | 5.13~ |
ubuntu/linux-oracle-5.4 | <5.4.0-1048.52~18.04.1 | 5.4.0-1048.52~18.04.1 |
ubuntu/linux-oracle-5.8 | <5.8.0-1033.34~20.04.1 | 5.8.0-1033.34~20.04.1 |
ubuntu/linux-raspi | <5.4.0-1038.41 | 5.4.0-1038.41 |
ubuntu/linux-raspi | <5.8.0-1029.32 | 5.8.0-1029.32 |
ubuntu/linux-raspi | <5.11.0-1012.13 | 5.11.0-1012.13 |
ubuntu/linux-raspi | <5.13~ | 5.13~ |
ubuntu/linux-raspi-5.4 | <5.4.0-1038.41~18.04.1 | 5.4.0-1038.41~18.04.1 |
ubuntu/linux-raspi-5.4 | <5.13~ | 5.13~ |
ubuntu/linux-raspi2 | <4.15.0-1092.98 | 4.15.0-1092.98 |
ubuntu/linux-raspi2 | <5.13~ | 5.13~ |
ubuntu/linux-raspi2-5.3 | <5.13~ | 5.13~ |
ubuntu/linux-riscv | <5.8.0-29.31 | 5.8.0-29.31 |
ubuntu/linux-riscv | <5.11.0-1012.12 | 5.11.0-1012.12 |
ubuntu/linux-riscv | <5.13~ | 5.13~ |
ubuntu/linux-riscv-5.11 | <5.13~ | 5.13~ |
ubuntu/linux-riscv-5.8 | <5.8.0-29.31~20.04.1 | 5.8.0-29.31~20.04.1 |
ubuntu/linux-riscv-5.8 | <5.13~ | 5.13~ |
ubuntu/linux-snapdragon | <4.15.0-1109.118 | 4.15.0-1109.118 |
ubuntu/linux-snapdragon | <5.13~ | 5.13~ |
Linux Linux kernel | >=4.4<4.4.271 | |
Linux Linux kernel | >=4.9<4.9.271 | |
Linux Linux kernel | >=4.14<4.14.235 | |
Linux Linux kernel | >=4.19<4.19.193 | |
Linux Linux kernel | >=5.4<5.4.124 | |
Linux Linux kernel | >=5.10<5.10.42 | |
Linux Linux kernel | >=5.12<5.12.9 | |
Debian Debian Linux | =9.0 | |
All of | ||
Arista C-75 Firmware | ||
Arista C-75 | ||
All of | ||
Arista O-90 Firmware | ||
Arista O-90 | ||
All of | ||
Arista C-65 Firmware | ||
Arista C-65 | ||
All of | ||
Arista W-68 Firmware | ||
Arista W-68 | ||
All of | ||
Siemens Scalance W700 Ieee 802.11n Firmware | ||
Siemens Scalance W700 Ieee 802.11n | ||
All of | ||
Siemens Scalance W1700 Ieee 802.11ac Firmware | ||
Siemens Scalance W1700 Ieee 802.11ac | ||
Arista C-75 Firmware | ||
Arista C-75 | ||
Arista O-90 Firmware | ||
Arista O-90 | ||
Arista C-65 Firmware | ||
Arista C-65 | ||
Arista W-68 Firmware | ||
Arista W-68 | ||
Siemens Scalance W700 Ieee 802.11n Firmware | ||
Siemens Scalance W700 Ieee 802.11n | ||
Siemens Scalance W1700 Ieee 802.11ac Firmware | ||
Siemens Scalance W1700 Ieee 802.11ac | ||
debian/linux | 4.19.249-2 4.19.304-1 5.10.209-2 5.10.216-1 6.1.76-1 6.1.90-1 6.7.12-1 6.8.9-1 |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)