[Bug 223051] security/vuxml: Document vulnerability in wpa_supplicant and hostapd
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Oct 16 19:09:28 UTC 2017
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223051
Bug ID: 223051
Summary: security/vuxml: Document vulnerability in
wpa_supplicant and hostapd
Product: Ports & Packages
Version: Latest
Hardware: Any
URL: http://w1.fi/security/2017-1/wpa-packet-number-reuse-w
ith-replayed-messages.txt
OS: Any
Status: New
Keywords: patch, security
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: ports-secteam at FreeBSD.org
Reporter: vlad-fbsd at acheronmedia.com
Assignee: ports-secteam at FreeBSD.org
Flags: maintainer-feedback?(ports-secteam at FreeBSD.org)
Created attachment 187219
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=187219&action=edit
Document vulnerability in WPA
A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys.
This set of vulnerabilities is also known as "KRACKs", or "Key Reinstallation
Attacks".
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list