--nextPart24387334.DVD5tmEPxM
Content-Type: multipart/alternative; boundary="nextPart9771008.LUn1fV4c5e"
Content-Transfer-Encoding: 7Bit
This is a multi-part message in MIME format.
--nextPart9771008.LUn1fV4c5e
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)
attacks
Date: November 10, 2017
Bugs: #634436, #634438
ID: 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A flaw was discovered in the 4-way handshake in hostapd and
wpa_supplicant that allows attackers to conduct a Man in the Middle
attack.
Background
==========
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and
authentication servers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-wireless/hostapd < 2.6-r1 >= 2.6-r1
2 net-wireless/wpa_supplicant
< 2.6-r3 >= 2.6-r3
-------------------------------------------------------------------
2 affected packages
Description
===========
WiFi Protected Access (WPA and WPA2) and it's associated technologies
are all vulnerable to the KRACK attacks. Please review the referenced
CVE identifiers for details.
Impact
======
An attacker can carry out the KRACK attacks on a wireless network in
order to gain access to network clients. Once achieved, the attacker
can potentially harvest confidential information (e.g. HTTP/HTTPS),
inject malware, or perform a myriad of other attacks.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All hostapd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.6-r1"
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"
References
==========
[ 1 ] CVE-2017-13077
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077
[ 2 ] CVE-2017-13078
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078
[ 3 ] CVE-2017-13079
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079
[ 4 ] CVE-2017-13080
--nextPart9771008.LUn1fV4c5e
Content-Transfer-Encoding: 7Bit
Content-Type: text/html; charset="us-ascii"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)
attacks
Date: November 10, 2017
Bugs: #634436, #634438
ID: 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A flaw was discovered in the 4-way handshake in hostapd and
wpa_supplicant that allows attackers to conduct a Man in the Middle
attack.
Background
==========
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and
authentication servers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-wireless/hostapd < 2.6-r1 >= 2.6-r1
2 net-wireless/wpa_supplicant
< 2.6-r3 >= 2.6-r3
-------------------------------------------------------------------
2 affected packages
Description
===========
WiFi Protected Access (WPA and WPA2) and it's associated technologies
are all vulnerable to the KRACK attacks. Please review the referenced
CVE identifiers for details.
Impact
======
An attacker can carry out the KRACK attacks on a wireless network in
order to gain access to network clients. Once achieved, the attacker
can potentially harvest confidential information (e.g. HTTP/HTTPS),
inject malware, or perform a myriad of other attacks.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All hostapd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.6-r1"
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"
References
==========
[ 1 ] CVE-2017-13077
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077
[ 2 ] CVE-2017-13078
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078
[ 3 ] CVE-2017-13079
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079
[ 4 ] CVE-2017-13080
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13080
[ 5 ] CVE-2017-13081
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13081
[ 6 ] CVE-2017-13082
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13082
[ 7 ] CVE-2017-13084
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13084
[ 8 ] CVE-2017-13086
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13086
[ 9 ] CVE-2017-13087
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13087
[ 10 ] CVE-2017-13088
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13088
[ 11 ] KRACK Attacks Website
https://www.krackattacks.com/
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201711-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--nextPart9771008.LUn1fV4c5e--
--nextPart24387334.DVD5tmEPxM
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit
-----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAloGKtUACgkQpRQw84X1
dt0eJQf+IfbzR7cFGXwarNfDrIgXp12vxGC9eLuZxqEZa/ar1bqahruJ7Tg6ky7x
AB+5FQg1QeNaVhlM6O5UcOLeHvAz9qY5+upbbMtvJKBXYICzThr+6LKBvSyqnFMX
F07OFWDaGw32UkeWtFVNWoY+TCQwFvjZ+ru/oH89RbnAoj7ePU4ar752A9wOJ5c9
PtQUpQMZELAJ6zXDwwmEosSmt0SeNRuvrPmCzy8dKN8Ov99xccJFxBxHFzAaQj5f
Zvi0WsKOHuOVM4qSDAzWeBHffBgglaA7mBl+c6ft+Qy4jF2R+gOBtIHrCp3vLedw
dmWc7rACAtIs8uHfR44xfviHEyBcJg==
=W33a
-----END PGP SIGNATURE-----
--nextPart24387334.DVD5tmEPxM--