aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/patch-specs.sh
diff options
context:
space:
mode:
authorStefan Lippers-Hollmann <s.l-h@gmx.de>2019-04-11 02:56:37 +0200
committerJo-Philipp Wich <jo@mein.io>2019-04-11 11:26:01 +0200
commit57ab9e3add0f10795b7db5b1f3d1b2eb9b8f92c9 (patch)
tree25c5f4e245024c85055a08e7dee0c9fa7871a436 /scripts/patch-specs.sh
parent262229e9248a5235844cdab6bb87fcb77b359b30 (diff)
downloadupstream-57ab9e3add0f10795b7db5b1f3d1b2eb9b8f92c9.tar.gz
upstream-57ab9e3add0f10795b7db5b1f3d1b2eb9b8f92c9.tar.bz2
upstream-57ab9e3add0f10795b7db5b1f3d1b2eb9b8f92c9.zip
hostapd: fix CVE-2019-9496
hostapd: fix SAE confirm missing state validation Published: April 10, 2019 Identifiers: - CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) Latest version available from: https://w1.fi/security/2019-3/ Vulnerability When hostapd is used to operate an access point with SAE (Simultaneous Authentication of Equals; also known as WPA3-Personal), an invalid authentication sequence could result in the hostapd process terminating due to a NULL pointer dereference when processing SAE confirm message. This was caused by missing state validation steps when processing the SAE confirm message in hostapd/AP mode. Similar cases against the wpa_supplicant SAE station implementation had already been tested by the hwsim test cases, but those sequences did not trigger this specific code path in AP mode which is why the issue was not discovered earlier. An attacker in radio range of an access point using hostapd in SAE configuration could use this issue to perform a denial of service attack by forcing the hostapd process to terminate. Vulnerable versions/configurations All hostapd versions with SAE support (CONFIG_SAE=y in the build configuration and SAE being enabled in the runtime configuration). Possible mitigation steps - Merge the following commit to hostapd and rebuild: SAE: Fix confirm message validation in error cases These patches are available from https://w1.fi/security/2019-3/ - Update to hostapd v2.8 or newer, once available Signed-off-by: Stefan Lippers-Hollmann <s.l-h@gmx.de> [bump PKG_RELEASE] Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Diffstat (limited to 'scripts/patch-specs.sh')
0 files changed, 0 insertions, 0 deletions