Name | CVE-2020-24588 |
Description | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2689-1, DLA-2690-1, DLA-3380-1, ELA-458-1, ELA-826-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
firmware-nonfree (PTS) | jessie/non-free | 20190114+really20220913-0+deb8u3 | fixed |
jessie/non-free (lts) | 20190114+really20220913-0+deb8u1 | fixed | |
stretch/non-free | 20190114+really20220913-0+deb9u3 | fixed | |
stretch/non-free (security) | 20190114-2~deb9u1 | vulnerable | |
stretch/non-free (lts) | 20190114+really20220913-0+deb9u1 | fixed | |
buster/non-free | 20190114+really20220913-0+deb10u3 | fixed | |
buster/non-free (security) | 20190114+really20220913-0+deb10u2 | fixed | |
bullseye/non-free | 20210315-3 | vulnerable | |
bookworm/non-free-firmware | 20230210-5 | fixed | |
trixie/non-free-firmware | 20240909-2 | fixed | |
sid/non-free-firmware | 20241210-1 | fixed | |
linux (PTS) | jessie, jessie (lts) | 3.16.84-1 | vulnerable |
stretch (security) | 4.9.320-2 | fixed | |
stretch (lts), stretch | 4.9.320-3 | fixed | |
buster (security), buster, buster (lts) | 4.19.316-1 | fixed | |
bullseye | 5.10.223-1 | fixed | |
bullseye (security) | 5.10.226-1 | fixed | |
bookworm | 6.1.115-1 | fixed | |
bookworm (security) | 6.1.119-1 | fixed | |
trixie | 6.12.5-1 | fixed | |
sid | 6.12.6-1 | fixed | |
linux-4.19 (PTS) | stretch (security) | 4.19.232-1~deb9u1 | fixed |
stretch (lts), stretch | 4.19.316-1~deb9u1 | fixed | |
linux-4.9 (PTS) | jessie, jessie (lts) | 4.9.303-1~deb8u3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
firmware-nonfree | source | experimental | 20210716-1~exp1 | |||
firmware-nonfree | source | jessie | 20190114+really20220913-0+deb8u1 | ELA-826-1 | ||
firmware-nonfree | source | stretch | 20190114+really20220913-0+deb9u1 | ELA-826-1 | ||
firmware-nonfree | source | buster | 20190114+really20220913-0+deb10u1 | DLA-3380-1 | ||
firmware-nonfree | source | (unstable) | 20210818-1 | |||
linux | source | jessie | (unfixed) | end-of-life | ||
linux | source | stretch | 4.9.272-1 | DLA-2689-1 | ||
linux | source | buster | 4.19.194-1 | |||
linux | source | (unstable) | 5.10.46-1 | |||
linux-4.19 | source | stretch | 4.19.194-1~deb9u1 | DLA-2690-1 | ||
linux-4.9 | source | jessie | 4.9.272-1~deb8u2 | ELA-458-1 |
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
https://papers.mathyvanhoef.com/usenix2021.pdf
https://www.fragattacks.com/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
https://lore.kernel.org/linux-wireless/c4d8c2f040b368225b72a91e74ee282d9ceab4d5.camel@coelho.fi/
https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/
https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/
https://lore.kernel.org/linux-wireless/20210511200110.11968c725b5c.Idd166365ebea2771c0c0a38c78b5060750f90e17@changeid/
Mitigation for similar attack to CVE-2020-24588:
https://lore.kernel.org/linux-wireless/20210511200110.0b2b886492f0.I23dd5d685fe16d3b0ec8106e8f01b59f499dffed@changeid/
https://lore.kernel.org/linux-wireless/20210511200110.076543300172.I548e6e71f1ee9cad4b9a37bf212ae7db723587aa@changeid/
firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=55d964905a2b6cd790cbbbb46640bb2fb520b0cb