Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:0478-1

Опубликовано: 15 фев. 2021
Источник: suse-cvrf

Описание

Security update for wpa_supplicant

This update for wpa_supplicant fixes the following issues:

  • CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
  • CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)

Список пакетов

HPE Helion OpenStack 8
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP2-BCL
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP2-LTSS
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP3-BCL
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP3-LTSS
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP4-LTSS
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
wpa_supplicant-2.6-15.13.1
SUSE OpenStack Cloud 7
wpa_supplicant-2.6-15.13.1
SUSE OpenStack Cloud 8
wpa_supplicant-2.6-15.13.1
SUSE OpenStack Cloud 9
wpa_supplicant-2.6-15.13.1
SUSE OpenStack Cloud Crowbar 8
wpa_supplicant-2.6-15.13.1
SUSE OpenStack Cloud Crowbar 9
wpa_supplicant-2.6-15.13.1

Описание

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.


Затронутые продукты
HPE Helion OpenStack 8:wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP2-BCL:wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP2-LTSS:wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP3-BCL:wpa_supplicant-2.6-15.13.1

Ссылки

Описание

In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525


Затронутые продукты
HPE Helion OpenStack 8:wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP2-BCL:wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP2-LTSS:wpa_supplicant-2.6-15.13.1
SUSE Linux Enterprise Server 12 SP3-BCL:wpa_supplicant-2.6-15.13.1

Ссылки
Уязвимость SUSE-SU-2021:0478-1