Fixed
Created: May 12, 2021
Updated: Apr 21, 2022
Resolved Date: Jun 29, 2021
Found In Version: 10.18.44.1
Fix Version: 10.18.44.23
Severity: Standard
Applicable for: Wind River Linux LTS 18
Component/s: Kernel
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
CREATE(Triage):(User=admin) CVE-2020-24586 (https://nvd.nist.gov/vuln/detail/CVE-2020-24586)