Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in wpa_supplicant
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in wpa_supplicant
ID: FEDORA-2015-6860
Distribution: Fedora
Plattformen: Fedora 21
Datum: Mo, 27. April 2015, 11:08
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863

Originalnachricht

Name        : wpa_supplicant
Product : Fedora 21
Version : 2.0
Release : 13.fc21
URL : http://w1.fi/wpa_supplicant/
Summary : WPA/WPA2/IEEE 802.1X Supplicant
Description :
wpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with support
for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE 802.1X/WPA
component that is used in the client stations. It implements key negotiation
with a WPA Authenticator and it controls the roaming and IEEE 802.11
authentication/association of the wlan driver.

-------------------------------------------------------------------------------
-
Update Information:

This update addresses a security vulnerability identified as CVE-2015-1863 . More information on this vulnerability is provided by upstream at https://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt . An extract:

Attacker (or a system controlled by the attacker) needs to be within radio
range of the vulnerable system to send a suitably constructed management frame that triggers a P2P peer device information to be created or updated.

The vulnerability is easiest to exploit while the device has started an active
P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control interface command in progress). However, it may be possible, though significantly more difficult, to trigger this even without any active P2P operation in progress.
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Apr 23 2015 Adam Williamson <awilliam@redhat.com> - 1:2.0-13
- backport fix for CVE-2015-1863
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update wpa_supplicant' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung