Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html
www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
www.debian.org/security/2017/dsa-3999
www.kb.cert.org/vuls/id/228519
www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
www.securityfocus.com/bid/101274
www.securitytracker.com/id/1039570
www.securitytracker.com/id/1039571
www.securitytracker.com/id/1039573
www.securitytracker.com/id/1039581
www.ubuntu.com/usn/USN-3455-1
access.redhat.com/errata/RHSA-2017:2907
access.redhat.com/security/vulnerabilities/kracks
cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
cert.vde.com/en-us/advisories/vde-2017-005
github.com/vanhoefm/krackattacks-test-ap-ft
ics-cert.us-cert.gov/advisories/ICSA-17-299-02
rockwellautomation.custhelp.com/app/answers/detail/a_id/1066697
security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
security.gentoo.org/glsa/201711-03
source.android.com/security/bulletin/2017-11-01
support.lenovo.com/us/en/product_security/LEN-17420
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
www.krackattacks.com/