summaryrefslogtreecommitdiffstats
path: root/documentation
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@intel.com>2017-10-16 17:03:04 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-10-16 23:46:38 +0100
commitde57fd8d9bd889d25c5fd79e7c2ec3a894062a93 (patch)
tree1e5e3228354ccce7ad9021ca32b244733e4264b8 /documentation
parent96967261993f8b583b51cdeccbb1fd06042d2192 (diff)
downloadpoky-de57fd8d9bd889d25c5fd79e7c2ec3a894062a93.tar.gz
wpa_supplicant: fix WPA2 key replay security bug
WPA2 is vulnerable to replay attacks which result in unauthenticated users having access to the network. * CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake * CVE-2017-13078: reinstallation of the group key in the Four-way handshake * CVE-2017-13079: reinstallation of the integrity group key in the Four-way handshake * CVE-2017-13080: reinstallation of the group key in the Group Key handshake * CVE-2017-13081: reinstallation of the integrity group key in the Group Key handshake * CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation Request and reinstalling the pairwise key while processing it * CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake * CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame * CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame Backport patches from upstream to resolve these CVEs. (From OE-Core rev: 1c46e201ef486395ec047f29af272f8c3dfd9611) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'documentation')
0 files changed, 0 insertions, 0 deletions