HomeFreeBSD

MFH: r452256 r452257

Description

MFH: r452256 r452257

Use https site.

Add patch set 2017-1.

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Approved by: leres (maintainer)
Approved by: ports-secteam (delphij)
Security: https://w1.fi/security/2017-1/ \

		wpa-packet-number-reuse-with-replayed-messages.txt

Security: https://www.krackattacks.com/
Differential Revision: D12691

Details

Provenance
cyAuthored on
Differential Revision
D12691: Patch CVE-2017-13077 in ports/net/hostapd
Parents
rP452264: MFH: r452261
Branches
Unknown
Tags
Unknown