ALT-PU-2018-2919-2
Package wpa_supplicant updated to version 2.7-alt1 for branch sisyphus in task 218059.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2017-02269
Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (STK-key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети
Modified: 2020-04-16
BDU:2020-00733
Уязвимость функции wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, позволяющая нарушителю получить несанкционированный доступ к информации
Modified: 2025-04-20
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://www.kb.cert.org/vuls/id/228519
- http://www.securityfocus.com/bid/101274
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039581
- https://access.redhat.com/security/vulnerabilities/kracks
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://security.gentoo.org/glsa/201711-03
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://www.krackattacks.com/
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://www.kb.cert.org/vuls/id/228519
- http://www.securityfocus.com/bid/101274
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039581
- https://access.redhat.com/security/vulnerabilities/kracks
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://security.gentoo.org/glsa/201711-03
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://www.krackattacks.com/
Modified: 2024-11-21
CVE-2018-14526
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html
- http://www.securitytracker.com/id/1041438
- https://access.redhat.com/errata/RHSA-2018:3107
- https://cert-portal.siemens.com/productcert/pdf/ssa-344983.pdf
- https://lists.debian.org/debian-lts-announce/2018/08/msg00009.html
- https://papers.mathyvanhoef.com/woot2018.pdf
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:11.hostapd.asc
- https://usn.ubuntu.com/3745-1/
- https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
- https://www.us-cert.gov/ics/advisories/icsa-19-344-01
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html
- http://www.securitytracker.com/id/1041438
- https://access.redhat.com/errata/RHSA-2018:3107
- https://cert-portal.siemens.com/productcert/pdf/ssa-344983.pdf
- https://lists.debian.org/debian-lts-announce/2018/08/msg00009.html
- https://papers.mathyvanhoef.com/woot2018.pdf
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:11.hostapd.asc
- https://usn.ubuntu.com/3745-1/
- https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
- https://www.us-cert.gov/ics/advisories/icsa-19-344-01
