vulnerability

Oracle Linux: CVE-2020-24588: ELSA-2021-4356: kernel security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Severity
3
CVSS
(AV:A/AC:M/Au:N/C:N/I:P/A:N)
Published
May 12, 2021
Added
Aug 10, 2021
Modified
Dec 3, 2025

Description

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.

Solutions

oracle-linux-upgrade-kerneloracle-linux-upgrade-kernel-uek
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.