Bug 223051

Summary: security/vuxml: Document vulnerability in wpa_supplicant and hostapd
Product: Ports & Packages Reporter: VK <vlad-fbsd>
Component: Individual Port(s)Assignee: Ports Security Team <ports-secteam>
Status: Closed FIXED    
Severity: Affects Some People CC: leres
Priority: --- Keywords: patch, security
Version: LatestFlags: bugzilla: maintainer-feedback? (ports-secteam)
Hardware: Any   
OS: Any   
URL: http://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
Attachments:
Description Flags
Document vulnerability in WPA none

Description VK 2017-10-16 19:09:27 UTC
Created attachment 187219 [details]
Document vulnerability in WPA

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys.

This set of vulnerabilities is also known as "KRACKs", or "Key Reinstallation Attacks".
Comment 1 VK 2017-10-16 19:26:23 UTC
Notify hostapd maintainer.
Comment 2 commit-hook freebsd_committer freebsd_triage 2017-10-16 19:58:43 UTC
A commit references this bug:

Author: swills
Date: Mon Oct 16 19:57:56 UTC 2017
New revision: 452248
URL: https://svnweb.freebsd.org/changeset/ports/452248

Log:
  Document hostapd and wpa_supplicant issue

  PR:		223051
  Submitted by:	Vladimir Krstulja <vlad-fbsd@acheronmedia.com>

Changes:
  head/security/vuxml/vuln.xml
Comment 3 Steve Wills freebsd_committer freebsd_triage 2017-10-16 20:02:47 UTC
Committed, thanks!