Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:1013-1

Опубликовано: 21 апр. 2015
Источник: suse-cvrf

Описание

Security update for wpa_supplicant

wpa_supplicant was updated to fix three security issues:

  • CVE-2015-0210: wpa_supplicant: broken certificate subject check this adds the 'domain_match' config option from upstream (additional to the already existing domain_suffix_match)
  • CVE-2014-3686: hostapd command execution
  • CVE-2015-1863: P2P SSID processing vulnerability

Список пакетов

SUSE Linux Enterprise Desktop 12
wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server 12
wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server for SAP Applications 12
wpa_supplicant-2.2-8.1

Описание

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.


Затронутые продукты
SUSE Linux Enterprise Desktop 12:wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server 12:wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server for SAP Applications 12:wpa_supplicant-2.2-8.1

Ссылки

Описание

wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.


Затронутые продукты
SUSE Linux Enterprise Desktop 12:wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server 12:wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server for SAP Applications 12:wpa_supplicant-2.2-8.1

Ссылки

Описание

Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.


Затронутые продукты
SUSE Linux Enterprise Desktop 12:wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server 12:wpa_supplicant-2.2-8.1
SUSE Linux Enterprise Server for SAP Applications 12:wpa_supplicant-2.2-8.1

Ссылки