wpa_supplicant-2.6-5.el7.1

エラータID: AXSA:2017-2342:03

Release date: 
Monday, October 23, 2017 - 22:26
Subject: 
wpa_supplicant-2.6-5.el7.1
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP,
WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They
implement key negotiation with a WPA Authenticator for client stations and
controls the roaming and IEEE 802.11 authentication and association of the
WLAN driver.

Security Fix(es):

* A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Asianux would like to thank CERT for reporting these issues. Upstream
acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of
these issues.

CVE-2017-13077
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way
handshake, allowing an attacker within radio range to replay, decrypt,
or spoof frames.
CVE-2017-13078
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Group Temporal Key (GTK) during the four-way handshake, allowing an
attacker within radio range to replay frames from access points to
clients.
CVE-2017-13080
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Group Temporal Key (GTK) during the group key handshake, allowing an
attacker within radio range to replay frames from access points to
clients.
CVE-2017-13082
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r
allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key
(TK) during the fast BSS transmission (FT) handshake, allowing an
attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13086
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS
handshake, allowing an attacker within radio range to replay, decrypt,
or spoof frames.
CVE-2017-13087
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows
reinstallation of the Group Temporal Key (GTK) when processing a
Wireless Network Management (WNM) Sleep Mode Response frame, allowing
an attacker within radio range to replay frames from access points to
clients.
CVE-2017-13088
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows
reinstallation of the Integrity Group Temporal Key (IGTK) when
processing a Wireless Network Management (WNM) Sleep Mode Response
frame, allowing an attacker within radio range to replay frames from
access points to clients.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. wpa_supplicant-2.6-5.el7.1.src.rpm
    MD5: 0ada13fea985f6d26fe7483b4315a2c0
    SHA-256: d4a65a40ca294e21942b325b71f56c39e39527531a3fcaa84078f8e1239d7b40
    Size: 2.73 MB

Asianux Server 7 for x86_64
  1. wpa_supplicant-2.6-5.el7.1.x86_64.rpm
    MD5: 4ee23d0e665fc307834211e599c9092c
    SHA-256: 5c950ef54053c422c4560d5999be87b002e97c2aa0f2574ab21b02e98eeda62b
    Size: 1.18 MB