Security Vulnerability : Dragonblood - Issues with WPA3's Dragonfly Handshake.
This document (7023818) is provided subject to the disclaimer at the end of this document.
Environment
SUSE Linux Enterprise Server 12
Situation
wpa_supplicant
wpa_supplicant is the client side WiFi authentication program used in Linux, and it is affected by some of the reported issues in newer versions.EAP-PWD is currently only enabled in wpa_supplicant in SUSE Linux Enterprise 15, wpa_supplicants on older SUSE products currently do not support this method and so are not affected.SAE in use by WPA 3 is currently only supported by the newer wpa_supplicant in SUSE Linux Enterprise 15, so older SUSE products are not affected by this problem.openssl
Also a weakness in openssl elliptic curve verification was identified, where the points on the curve were not correctly validated, which in turn could cause services that use openssl to authenticate using elliptic curves to allow bypass of checks.Openssl versions in SUSE Linux Enterprise 12 and older are affected and will receive hardening fixes.
Resolution
Cause
Additional Information
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7023818
- Creation Date: 11-Apr-2019
- Modified Date:03-Mar-2020
-
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com