Brad Bishop | d5ae7d9 | 2018-06-14 09:52:03 -0700 | [diff] [blame] | 1 | The WPA2 four-way handshake protocol is vulnerable to replay attacks which can |
| 2 | result in unauthenticated clients gaining access to the network. |
| 3 | |
| 4 | Backport a number of patches from upstream to fix this. |
| 5 | |
| 6 | CVE: CVE-2017-13077 |
| 7 | CVE: CVE-2017-13078 |
| 8 | CVE: CVE-2017-13079 |
| 9 | CVE: CVE-2017-13080 |
| 10 | CVE: CVE-2017-13081 |
| 11 | CVE: CVE-2017-13082 |
| 12 | CVE: CVE-2017-13086 |
| 13 | CVE: CVE-2017-13087 |
| 14 | CVE: CVE-2017-13088 |
| 15 | |
| 16 | Upstream-Status: Backport |
| 17 | Signed-off-by: Ross Burton <ross.burton@intel.com> |
| 18 | |
| 19 | From 53c5eb58e95004f86e65ee9fbfccbc291b139057 Mon Sep 17 00:00:00 2001 |
| 20 | From: Jouni Malinen <j@w1.fi> |
| 21 | Date: Fri, 22 Sep 2017 11:25:02 +0300 |
| 22 | Subject: [PATCH 7/8] WNM: Ignore WNM-Sleep Mode Response without pending |
| 23 | request |
| 24 | |
| 25 | Commit 03ed0a52393710be6bdae657d1b36efa146520e5 ('WNM: Ignore WNM-Sleep |
| 26 | Mode Response if WNM-Sleep Mode has not been used') started ignoring the |
| 27 | response when no WNM-Sleep Mode Request had been used during the |
| 28 | association. This can be made tighter by clearing the used flag when |
| 29 | successfully processing a response. This adds an additional layer of |
| 30 | protection against unexpected retransmissions of the response frame. |
| 31 | |
| 32 | Signed-off-by: Jouni Malinen <j@w1.fi> |
| 33 | --- |
| 34 | wpa_supplicant/wnm_sta.c | 4 +++- |
| 35 | 1 file changed, 3 insertions(+), 1 deletion(-) |
| 36 | |
| 37 | diff --git a/wpa_supplicant/wnm_sta.c b/wpa_supplicant/wnm_sta.c |
| 38 | index 1b3409c..67a07ff 100644 |
| 39 | --- a/wpa_supplicant/wnm_sta.c |
| 40 | +++ b/wpa_supplicant/wnm_sta.c |
| 41 | @@ -260,7 +260,7 @@ static void ieee802_11_rx_wnmsleep_resp(struct wpa_supplicant *wpa_s, |
| 42 | |
| 43 | if (!wpa_s->wnmsleep_used) { |
| 44 | wpa_printf(MSG_DEBUG, |
| 45 | - "WNM: Ignore WNM-Sleep Mode Response frame since WNM-Sleep Mode has not been used in this association"); |
| 46 | + "WNM: Ignore WNM-Sleep Mode Response frame since WNM-Sleep Mode operation has not been requested"); |
| 47 | return; |
| 48 | } |
| 49 | |
| 50 | @@ -299,6 +299,8 @@ static void ieee802_11_rx_wnmsleep_resp(struct wpa_supplicant *wpa_s, |
| 51 | return; |
| 52 | } |
| 53 | |
| 54 | + wpa_s->wnmsleep_used = 0; |
| 55 | + |
| 56 | if (wnmsleep_ie->status == WNM_STATUS_SLEEP_ACCEPT || |
| 57 | wnmsleep_ie->status == WNM_STATUS_SLEEP_EXIT_ACCEPT_GTK_UPDATE) { |
| 58 | wpa_printf(MSG_DEBUG, "Successfully recv WNM-Sleep Response " |
| 59 | -- |
| 60 | 2.7.4 |