[Bug 223051] security/vuxml: Document vulnerability in wpa_supplicant and hostapd

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Mon Oct 16 19:09:28 UTC 2017


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223051

            Bug ID: 223051
           Summary: security/vuxml: Document vulnerability in
                    wpa_supplicant and hostapd
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: http://w1.fi/security/2017-1/wpa-packet-number-reuse-w
                    ith-replayed-messages.txt
                OS: Any
            Status: New
          Keywords: patch, security
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-secteam at FreeBSD.org
          Reporter: vlad-fbsd at acheronmedia.com
          Assignee: ports-secteam at FreeBSD.org
             Flags: maintainer-feedback?(ports-secteam at FreeBSD.org)

Created attachment 187219
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=187219&action=edit
Document vulnerability in WPA

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys.

This set of vulnerabilities is also known as "KRACKs", or "Key Reinstallation
Attacks".

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list