QID 353147

Date Published: 2022-02-01

QID 353147: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-004

a flaw was found in the linux kernels implementation of wifi fragmentation handling.
An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device. (
( CVE-2020-24586) a flaw was found in the linux kernels wifi implementation.
An attacker within the wireless range can abuse a logic flaw in the wifi implementation by reassembling packets from multiple fragments under different keys, treating them as valid.
This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key.
The highest threat from this vulnerability is to confidentiality. (
( CVE-2020-24587) a flaw was found in the linux kernels wifi implementation.
An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data.
this can cause the frame to pass checks and be considered a valid frame of a different type. (
( CVE-2020-24588) frames used for authentication and key management between the ap and connected clients.
some clients may take these redirected frames masquerading as control mechanisms from the ap. (
( CVE-2020-26139) a vulnerability was found in linux kernels wifi implementation.
an attacker within wireless range can inject a control packet fragment where the kernel does not verify the message integrity check (authenticity) of fragmented tkip frames. (
The highest threat from this vulnerability is to integrity. (
( CVE-2020-26558) a flaw was found in the linux kernel.
A local user could use this flaw to crash the system. (

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.9 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.4-2022-004 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.4-2022-004 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html