GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Jun 27, 2016 11:26 am Post subject: [ GLSA 201606-17 ] hostapd and wpa_supplicant |
|
|
Gentoo Linux Security Advisory
Title: hostapd and wpa_supplicant: Multiple vulnerabilities (GLSA 201606-17)
Severity: normal
Exploitable: remote
Date: June 27, 2016
Bug(s): #524928, #547492, #548742, #548744, #554860, #554862
ID: 201606-17
Synopsis
Multiple vulnerabilities have been found in hostapd and
wpa_supplicant, allowing remote attackers to execute arbitrary code or
cause Denial of Service.
Background
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and
authentication servers.
Affected Packages
Package: net-wireless/hostapd
Vulnerable: < 2.5
Unaffected: >= 2.5
Architectures: All supported architectures
Package: net-wireless/wpa_supplicant
Vulnerable: < 2.5-r1
Unaffected: >= 2.5-r1
Architectures: All supported architectures
Description
Multiple vulnerabilities exist in both hostapd and wpa_supplicant.
Please review the CVE identifiers for more information.
Impact
Remote attackers could execute arbitrary code with the privileges of the
process or cause Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All hostapd users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.5"
| All wpa_supplicant users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose
">=net-wireless/wpa_supplicant-2.5-r1"
|
References
CVE-2014-3686
CVE-2014-3686
CVE-2015-1863
CVE-2015-4141
CVE-2015-4142
CVE-2015-4143
CVE-2015-4144
CVE-2015-4145
CVE-2015-4146 |
|