1
PublicDateAtUSN: 2017-10-16
2
Candidate: CVE-2017-13080
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
6
https://www.krackattacks.com/
7
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
8
https://usn.ubuntu.com/usn/usn-3455-1
9
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr
10
https://usn.ubuntu.com/usn/usn-3505-1
12
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group
13
Temporal Key (GTK) during the group key handshake, allowing an attacker
14
within radio range to replay frames from access points to clients.
17
mdeslaur> related to intel wireless firmware issue CVE-2017-5729
19
https://bugs.launchpad.net/intel/+bug/1728762
21
Discovered-by: Mathy Vanhoef
25
upstream_wpa: needs-triage
27
trusty_wpa: released (2.1-0ubuntu1.5)
28
vivid/ubuntu-core_wpa: ignored (reached end-of-life)
29
xenial_wpa: released (2.4-0ubuntu6.2)
30
zesty_wpa: released (2.4-0ubuntu9.1)
31
artful_wpa: released (2.4-0ubuntu10)
32
bionic_wpa: released (2.4-0ubuntu10)
33
devel_wpa: released (2.4-0ubuntu10)
35
Patches_linux-firmware:
36
upstream_linux-firmware: needs-triage
37
precise/esm_linux-firmware: needed
38
trusty_linux-firmware: released (1.127.24)
39
xenial_linux-firmware: released (1.157.14)
40
zesty_linux-firmware: released (1.164.2)
41
artful_linux-firmware: released (1.169.1)
42
bionic_linux-firmware: released (1.170)
43
devel_linux-firmware: released (1.170)