'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in certain Atherons based chipsets. THis could allow an attacker to infer previous keys References: https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/ https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2010859]
This was fixed for Fedora with the 5.12.x kernel rebases.