CVE-2017-13081

NameCVE-2017-13081
DescriptionWi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1150-1, DLA-1573-1, DSA-3999-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firmware-nonfree (PTS)bullseye/non-free20210315-3fixed
bookworm/non-free-firmware20230210-5fixed
trixie/non-free-firmware20240909-2fixed
sid/non-free-firmware20241210-1fixed
wpa (PTS)bullseye (security), bullseye2:2.9.0-21+deb11u2fixed
bookworm, bookworm (security)2:2.10-12+deb12u2fixed
sid, trixie2:2.10-22fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firmware-nonfreesourcejessie20161130-4~deb8u1DLA-1573-1
firmware-nonfreesourcestretch20161130-4
firmware-nonfreesource(unstable)20180825-1
wpasourcewheezy1.0-3+deb7u5DLA-1150-1
wpasourcejessie2.3-1+deb8u5DSA-3999-1
wpasourcestretch2:2.4-1+deb9u1DSA-3999-1
wpasource(unstable)2:2.4-1.1

Notes

[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
https://w1.fi/security/2017-1/

Search for package or bug name: Reporting problems