From bfa04fa71c47e8fe9528208848cfcec2e232777d Mon Sep 17 00:00:00 2001 From: Ross Burton Date: Mon, 16 Oct 2017 23:23:37 +0100 Subject: wpa_supplicant: fix WPA2 key replay security bug WPA2 is vulnerable to replay attacks which result in unauthenticated users having access to the network. * CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake * CVE-2017-13078: reinstallation of the group key in the Four-way handshake * CVE-2017-13079: reinstallation of the integrity group key in the Four-way handshake * CVE-2017-13080: reinstallation of the group key in the Group Key handshake * CVE-2017-13081: reinstallation of the integrity group key in the Group Key handshake * CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation Request and reinstalling the pairwise key while processing it * CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake * CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame * CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame Backport patches from upstream to resolve these CVEs. Signed-off-by: Ross Burton Signed-off-by: Richard Purdie --- meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb') diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb index a4160e1c5c..f4b3b6a887 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb @@ -29,6 +29,7 @@ SRC_URI = "http://w1.fi/releases/wpa_supplicant-${PV}.tar.gz \ file://0001-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch \ file://0002-Reject-SET_CRED-commands-with-newline-characters-in-.patch \ file://0003-Reject-SET-commands-with-newline-characters-in-the-s.patch \ + file://key-replay-cve-multiple.patch \ " SRC_URI[md5sum] = "96ff75c3a514f1f324560a2376f13110" SRC_URI[sha256sum] = "cce55bae483b364eae55c35ba567c279be442ed8bab5b80a3c7fb0d057b9b316" -- cgit 1.2.3-korg