First published: Tue Apr 06 2021(Updated: )
A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
Linux Linux kernel | <5.12 | |
Fedoraproject Fedora | =34 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.6 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.6 | |
Redhat Enterprise Linux For Real Time | =8.0 | |
Redhat Enterprise Linux For Real Time For Nfv | =8.0 | |
Redhat Enterprise Linux For Real Time For Nfv Tus | =8.6 | |
Redhat Enterprise Linux For Real Time Tus | =8.6 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server Eus | =8.6 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Redhat Codeready Linux Builder | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.6 | |
Redhat Virtualization Host | =4.0 | |
All of | ||
Any of | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.6 | |
Redhat Codeready Linux Builder | ||
All of | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Virtualization Host | =4.0 | |
redhat/Kernel | <5.12 | 5.12 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.