Hide Forgot
A vulnerability was found in Linux Kernel, where the wifi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. upstream patch: https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1960499]
As per the patches desciption and the vulnerability desciption in the paper, these patches seems to be addressing this vulnerability, despite only mentioning CVE-2020-24588: 2b8a1fee3488 cfg80211: mitigate A-MSDU aggregation attacks 62a8ff67eba5 ath10k: Validate first subframe of A-MSDU before processing the list 2c2bdd2372af mt76: validate rx A-MSDU subframes
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4140 https://access.redhat.com/errata/RHSA-2021:4140
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4356 https://access.redhat.com/errata/RHSA-2021:4356
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-26144
This was fixed for Fedora with the 5.12.9 stable kernel updates.
2b8a1fee3488 states: > Note that for kernel 4.9 and above this patch depends on "mac80211: > properly handle A-MSDUs that start with a rfc1042 header". Otherwise > this patch has no impact and attacks will remain possible. a1d5ff5651ea592c67054233b14b30bf4452999c mac80211: properly handle A-MSDUs that start with a rfc1042 header" is
Double checking Mark's warning of dependency commit: * it's pre v5.14 so already included in RHEL 9 since the fork point * commit a1d5ff5651 included in RHEL 8.5, at the same time than the commits from comment 20, so there are not any version with the vulnerability. Thanks Mark.