[ GLSA 201711-03 ] hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks

\n\n–nextPart24387334.DVD5tmEPxM
Content-Type: multipart/alternative; boundary=”nextPart9771008.LUn1fV4c5e”
Content-Transfer-Encoding: 7Bit

This is a multi-part message in MIME format.

–nextPart9771008.LUn1fV4c5e
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset=”us-ascii”

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201711-03
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)
attacks
Date: November 10, 2017
Bugs: #634436, #634438
ID: 201711-03

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

A flaw was discovered in the 4-way handshake in hostapd and
wpa_supplicant that allows attackers to conduct a Man in the Middle
attack.

Background
==========

wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and
authentication servers.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 net-wireless/hostapd = 2.6-r1
2 net-wireless/wpa_supplicant
= 2.6-r3
——————————————————————-
2 affected packages

Description
===========

WiFi Protected Access (WPA and WPA2) and it’s associated technologies
are all vulnerable to the KRACK attacks. Please review the referenced
CVE identifiers for details.

Impact
======

An attacker can carry out the KRACK attacks on a wireless network in
order to gain access to network clients. Once achieved, the attacker
can potentially harvest confidential information (e.g. HTTP/HTTPS),
inject malware, or perform a myriad of other attacks.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All hostapd users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=net-wireless/hostapd-2.6-r1”

All wpa_supplicant users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot -v “>=net-wireless/wpa_supplicant-2.6-r3″

References
==========

[ 1 ] CVE-2017-13077
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077
[ 2 ] CVE-2017-13078
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078
[ 3 ] CVE-2017-13079
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079
[ 4 ] CVE-2017-13080
–nextPart9771008.LUn1fV4c5e
Content-Transfer-Encoding: 7Bit
Content-Type: text/html; charset=”us-ascii”

p, li { white-space: pre-wrap; }

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Gentoo Linux Security Advisory GLSA 201711-03

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

https://security.gentoo.org/

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

 

Severity: Normal

Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)

attacks

Date: November 10, 2017

Bugs: #634436, #634438

ID: 201711-03

 

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

 

Synopsis

========

 

A flaw was discovered in the 4-way handshake in hostapd and

wpa_supplicant that allows attackers to conduct a Man in the Middle

attack.

 

Background

==========

 

wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE

802.11i / RSN). hostapd is a user space daemon for access point and

authentication servers.

 

Affected packages

=================

 

——————————————————————-

Package / Vulnerable / Unaffected

——————————————————————-

1 net-wireless/hostapd < 2.6-r1 >= 2.6-r1

2 net-wireless/wpa_supplicant

< 2.6-r3 >= 2.6-r3

——————————————————————-

2 affected packages

 

Description

===========

 

WiFi Protected Access (WPA and WPA2) and it’s associated technologies

are all vulnerable to the KRACK attacks. Please review the referenced

CVE identifiers for details.

 

Impact

======

 

An attacker can carry out the KRACK attacks on a wireless network in

order to gain access to network clients. Once achieved, the attacker

can potentially harvest confidential information (e.g. HTTP/HTTPS),

inject malware, or perform a myriad of other attacks.

 

Workaround

==========

 

There is no known workaround at this time.

 

Resolution

==========

 

All hostapd users should upgrade to the latest version:

 

# emerge –sync

# emerge –ask –oneshot –verbose ">=net-wireless/hostapd-2.6-r1"

 

All wpa_supplicant users should upgrade to the latest version:

 

# emerge –sync

# emerge –ask –oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"

 

References

==========

 

[ 1 ] CVE-2017-13077

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077

[ 2 ] CVE-2017-13078

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078

[ 3 ] CVE-2017-13079

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079

[ 4 ] CVE-2017-13080

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13080

[ 5 ] CVE-2017-13081

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13081

[ 6 ] CVE-2017-13082

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13082

[ 7 ] CVE-2017-13084

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13084

[ 8 ] CVE-2017-13086

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13086

[ 9 ] CVE-2017-13087

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13087

[ 10 ] CVE-2017-13088

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13088

[ 11 ] KRACK Attacks Website

https://www.krackattacks.com/

 

Availability

============

 

This GLSA and any updates to it are available for viewing at

the Gentoo Security Website:

 

https://security.gentoo.org/glsa/201711-03

 

Concerns?

=========

 

Security is a primary focus of Gentoo Linux and ensuring the

confidentiality and security of our users’ machines is of utmost

importance to us. Any security concerns should be addressed to

security@gentoo.org or alternatively, you may file a bug at

https://bugs.gentoo.org.

 

License

=======

 

Copyright 2017 Gentoo Foundation, Inc; referenced text

belongs to its owner(s).

 

The contents of this document are licensed under the

Creative Commons – Attribution / Share Alike license.

 

http://creativecommons.org/licenses/by-sa/2.5

–nextPart9771008.LUn1fV4c5e–

–nextPart24387334.DVD5tmEPxM
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit

—–BEGIN PGP SIGNATURE—–

iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAloGKtUACgkQpRQw84X1
dt0eJQf+IfbzR7cFGXwarNfDrIgXp12vxGC9eLuZxqEZa/ar1bqahruJ7Tg6ky7x
AB+5FQg1QeNaVhlM6O5UcOLeHvAz9qY5+upbbMtvJKBXYICzThr+6LKBvSyqnFMX
F07OFWDaGw32UkeWtFVNWoY+TCQwFvjZ+ru/oH89RbnAoj7ePU4ar752A9wOJ5c9
PtQUpQMZELAJ6zXDwwmEosSmt0SeNRuvrPmCzy8dKN8Ov99xccJFxBxHFzAaQj5f
Zvi0WsKOHuOVM4qSDAzWeBHffBgglaA7mBl+c6ft+Qy4jF2R+gOBtIHrCp3vLedw
dmWc7rACAtIs8uHfR44xfviHEyBcJg==
=W33a
—–END PGP SIGNATURE—–

–nextPart24387334.DVD5tmEPxM–