CVE-2020-24587 log

Source
Severity Medium
Remote Yes
Type Information disclosure
Description
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
Group Package Affected Fixed Severity Status Ticket
AVG-2034 linux-lts 5.10.41-1 5.10.42-1 Medium Fixed
AVG-2033 linux-hardened 5.12.7.hardened1-1 5.12.9.hardened1-1 Medium Fixed
AVG-2032 linux-zen 5.12.8.zen1-1 5.12.9.zen1-1 Medium Fixed
AVG-2031 linux 5.12.8.arch1-1 5.12.9.arch1-1 Medium Fixed
References
https://www.openwall.com/lists/oss-security/2021/05/11/12
https://papers.mathyvanhoef.com/usenix2021.pdf
https://www.fragattacks.com/
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.9&id=94eebceb18e552c72b845055ca9d12c3debc0c99
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.9&id=3c47cee66b3887c259acb7b502596703c8459397
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.9&id=063aa9df5ae99e0c9a7a5a76b9b836897de4a048
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.42&id=42d98e02193d163c1523a8840a2effcc4c6eb111
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.42&id=6abcc01e8b3b804a7f18721666d978f39470e30c
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.42&id=cc5d84b1b07d5239c2ca591cab3e3e4e7b0384e4