summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/key-replay-cve-multiple7.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/key-replay-cve-multiple7.patch')
-rw-r--r--meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/key-replay-cve-multiple7.patch60
1 files changed, 60 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/key-replay-cve-multiple7.patch b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/key-replay-cve-multiple7.patch
new file mode 100644
index 0000000000..2e12bc7555
--- /dev/null
+++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/key-replay-cve-multiple7.patch
@@ -0,0 +1,60 @@
1The WPA2 four-way handshake protocol is vulnerable to replay attacks which can
2result in unauthenticated clients gaining access to the network.
3
4Backport a number of patches from upstream to fix this.
5
6CVE: CVE-2017-13077
7CVE: CVE-2017-13078
8CVE: CVE-2017-13079
9CVE: CVE-2017-13080
10CVE: CVE-2017-13081
11CVE: CVE-2017-13082
12CVE: CVE-2017-13086
13CVE: CVE-2017-13087
14CVE: CVE-2017-13088
15
16Upstream-Status: Backport
17Signed-off-by: Ross Burton <ross.burton@intel.com>
18
19From 53c5eb58e95004f86e65ee9fbfccbc291b139057 Mon Sep 17 00:00:00 2001
20From: Jouni Malinen <j@w1.fi>
21Date: Fri, 22 Sep 2017 11:25:02 +0300
22Subject: [PATCH 7/8] WNM: Ignore WNM-Sleep Mode Response without pending
23 request
24
25Commit 03ed0a52393710be6bdae657d1b36efa146520e5 ('WNM: Ignore WNM-Sleep
26Mode Response if WNM-Sleep Mode has not been used') started ignoring the
27response when no WNM-Sleep Mode Request had been used during the
28association. This can be made tighter by clearing the used flag when
29successfully processing a response. This adds an additional layer of
30protection against unexpected retransmissions of the response frame.
31
32Signed-off-by: Jouni Malinen <j@w1.fi>
33---
34 wpa_supplicant/wnm_sta.c | 4 +++-
35 1 file changed, 3 insertions(+), 1 deletion(-)
36
37diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c
38index 1b3409c..67a07ff 100644
39--- a/wpa_supplicant/wnm_sta.c
40+++ b/wpa_supplicant/wnm_sta.c
41@@ -260,7 +260,7 @@ static void ieee802_11_rx_wnmsleep_resp(struct wpa_supplicant *wpa_s,
42
43 if (!wpa_s->wnmsleep_used) {
44 wpa_printf(MSG_DEBUG,
45- "WNM: Ignore WNM-Sleep Mode Response frame since WNM-Sleep Mode has not been used in this association");
46+ "WNM: Ignore WNM-Sleep Mode Response frame since WNM-Sleep Mode operation has not been requested");
47 return;
48 }
49
50@@ -299,6 +299,8 @@ static void ieee802_11_rx_wnmsleep_resp(struct wpa_supplicant *wpa_s,
51 return;
52 }
53
54+ wpa_s->wnmsleep_used = 0;
55+
56 if (wnmsleep_ie->status == WNM_STATUS_SLEEP_ACCEPT ||
57 wnmsleep_ie->status == WNM_STATUS_SLEEP_EXIT_ACCEPT_GTK_UPDATE) {
58 wpa_printf(MSG_DEBUG, "Successfully recv WNM-Sleep Response "
59--
602.7.4 \ No newline at end of file