| Name | CVE-2020-24586 |
| Description | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-2689-1, DLA-2690-1, DLA-3380-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| firmware-nonfree (PTS) | bullseye/non-free | 20210315-3 | vulnerable |
| bookworm/non-free-firmware | 20230210-5 | fixed | |
| trixie/non-free-firmware | 20250410-2 | fixed | |
| forky/non-free-firmware, sid/non-free-firmware | 20251021-1 | fixed | |
| linux (PTS) | bullseye | 5.10.223-1 | fixed |
| bullseye (security) | 5.10.244-1 | fixed | |
| bookworm | 6.1.148-1 | fixed | |
| bookworm (security) | 6.1.153-1 | fixed | |
| trixie | 6.12.43-1 | fixed | |
| trixie (security) | 6.12.48-1 | fixed | |
| forky | 6.16.12-2 | fixed | |
| sid | 6.17.7-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| firmware-nonfree | source | experimental | 20210716-1~exp1 | |||
| firmware-nonfree | source | buster | 20190114+really20220913-0+deb10u1 | DLA-3380-1 | ||
| firmware-nonfree | source | (unstable) | 20210818-1 | |||
| linux | source | stretch | 4.9.272-1 | DLA-2689-1 | ||
| linux | source | buster | 4.19.194-1 | |||
| linux | source | (unstable) | 5.10.46-1 | |||
| linux-4.19 | source | stretch | 4.19.194-1~deb9u1 | DLA-2690-1 |
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
https://papers.mathyvanhoef.com/usenix2021.pdf
https://www.fragattacks.com/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
https://lore.kernel.org/linux-wireless/c4d8c2f040b368225b72a91e74ee282d9ceab4d5.camel@coelho.fi/
https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/
firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=55d964905a2b6cd790cbbbb46640bb2fb520b0cb