diff options
author | Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be> | 2021-05-11 20:02:43 +0200 |
---|---|---|
committer | Johannes Berg <johannes.berg@intel.com> | 2021-05-11 20:12:51 +0200 |
commit | 94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24 (patch) | |
tree | a6319a8f6aa0c1c11131b86e5328cb4b7b0d54fd /net/mac80211/key.h | |
parent | 965a7d72e798eb7af0aa67210e37cf7ecd1c9cad (diff) | |
download | linux-94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24.tar.gz linux-94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24.tar.bz2 linux-94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24.zip |
mac80211: prevent mixed key and fragment cache attacks
Simultaneously prevent mixed key attacks (CVE-2020-24587) and fragment
cache attacks (CVE-2020-24586). This is accomplished by assigning a
unique color to every key (per interface) and using this to track which
key was used to decrypt a fragment. When reassembling frames, it is
now checked whether all fragments were decrypted using the same key.
To assure that fragment cache attacks are also prevented, the ID that is
assigned to keys is unique even over (re)associations and (re)connects.
This means fragments separated by a (re)association or (re)connect will
not be reassembled. Because mac80211 now also prevents the reassembly of
mixed encrypted and plaintext fragments, all cache attacks are prevented.
Cc: stable@vger.kernel.org
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be>
Link: https://lore.kernel.org/r/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'net/mac80211/key.h')
-rw-r--r-- | net/mac80211/key.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/net/mac80211/key.h b/net/mac80211/key.h index 7ad72e9b4991..1e326c89d721 100644 --- a/net/mac80211/key.h +++ b/net/mac80211/key.h @@ -128,6 +128,8 @@ struct ieee80211_key { } debugfs; #endif + unsigned int color; + /* * key config, must be last because it contains key * material as variable length member |