Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:0519-1

Опубликовано: 08 апр. 2021
Источник: suse-cvrf

Описание

Security update for hostapd

This update for hostapd fixes the following issues:

  • CVE-2021-30004: forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c (boo#1184348)

  • CVE-2020-12695: UPnP SUBSCRIBE misbehavior in hostapd WPS AP (boo#1172700)

  • CVE-2019-16275: AP mode PMF disconnection protection bypass (boo#1150934)

  • added AppArmor profile (source apparmor-usr.sbin.hostapd)

Список пакетов

openSUSE Leap 15.2
hostapd-2.9-lp152.2.3.1

Описание

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.


Затронутые продукты
openSUSE Leap 15.2:hostapd-2.9-lp152.2.3.1

Ссылки

Описание

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.


Затронутые продукты
openSUSE Leap 15.2:hostapd-2.9-lp152.2.3.1

Ссылки

Описание

In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.


Затронутые продукты
openSUSE Leap 15.2:hostapd-2.9-lp152.2.3.1

Ссылки