Bug 1960494 (CVE-2020-26142)
Summary: | CVE-2020-26142 kernel: processing fragmented frames as full frames | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, bhu, blc, bmasney, brdeoliv, bskeggs, chwhite, crwood, dhoward, dvlasenk, fhrbata, fpacheco, hdegoede, hkrzesin, ihuguet, jarodwilson, jeremy, jforbes, jglisse, jlelli, jonathan, josef, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mlangsdo, nmurray, ptalbert, qzhao, rvrbovsk, steved, walters, wcosta, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel, where the WiFi implementations treat fragmented frames as full frames. This flaw allows an attacker to inject arbitrary network packets independent of the network configuration. The highest threat from this vulnerability is to integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-05-19 01:14:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1960495 | ||
Bug Blocks: | 1959275 |
Description
Dhananjay Arunesh
2021-05-14 03:37:23 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1960495] As per the research paper ( https://papers.mathyvanhoef.com/usenix2021.pdf page 13 and 14). "Certain implementations, such as OpenBSD and the ESP-12F, do not support A-MSDUs or fragmented frames. However, they are still vulnerable to attacks because they treat all frames as non-fragmented ones (CVE-2020-26142)." Marking notaffected as I do not see where this affecting RHEL or Linux systems. I would suggest Fedora do the same, but I'll let them make that call. Thanks. `git log --oneline --grep CVE-2020-24588` gives this output: 2c2bdd2372af mt76: validate rx A-MSDU subframes 079a108feba4 ath10k: drop MPDU which has discard flag set by firmware for SDIO 270032a2a9c4 mac80211: drop A-MSDUs on old ciphers 2b8a1fee3488 cfg80211: mitigate A-MSDU aggregation attacks Looking at the patches, they claim to fix this CVE and similar attacks. I suggest reopening this BZ. (In reply to Íñigo Huguet from comment #6) > `git log --oneline --grep CVE-2020-24588` gives this output: > 2c2bdd2372af mt76: validate rx A-MSDU subframes > 079a108feba4 ath10k: drop MPDU which has discard flag set by firmware for > SDIO > 270032a2a9c4 mac80211: drop A-MSDUs on old ciphers > 2b8a1fee3488 cfg80211: mitigate A-MSDU aggregation attacks > > Looking at the patches, they claim to fix this CVE and similar attacks. I > suggest reopening this BZ. Sorry, my mistake, I mixed 2 different CVEs. Forget that. This was fixed for Fedora with the 5.12.9 stable kernel updates. |