Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in hostapd
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in hostapd
ID: FEDORA-2012-15759
Distribution: Fedora
Plattformen: Fedora 17
Datum: Do, 18. Oktober 2012, 08:10
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4445
Applikationen: hostapd

Originalnachricht

Name        : hostapd
Product : Fedora 17
Version : 0.7.3
Release : 10.fc17
URL : http://w1.fi/hostapd
Summary : IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Description :
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server.

hostapd is designed to be a "daemon" program that runs in the back-
ground and acts as the backend component controlling authentication.
hostapd supports separate frontend programs and an example text-based
frontend, hostapd_cli, is included with hostapd.

-------------------------------------------------------------------------------
-
Update Information:

EAP-TLS server: Fix TLS Message Length validation
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Oct 8 2012 John W. Linville <linville@redhat.com> - 0.7.3-10
- EAP-TLS: Add extra validation for TLS Message Length
* Fri Jun 8 2012 John W. Linville <linville@redhat.com> - 0.7.3-9
- Remove hostapd-specific runtime state directory
* Wed Jun 6 2012 John W. Linville <linville@redhat.com> - 0.7.3-8
- Fixup typo in pid file path in hostapd.service
* Wed May 30 2012 John W. Linville <linville@redhat.com> - 0.7.3-7
- Add BuildRequires for systemd-units
* Fri May 25 2012 John W. Linville <linville@redhat.com> - 0.7.3-6
- Fixup typo in configuration file path in hostapd.service
- Tighten-up default permissions for hostapd.conf
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #859918 - CVE-2012-4445 hostapd, wpa_supplicant: DoS (abort) by
processing certain fragmented EAP-TLS messages
https://bugzilla.redhat.com/show_bug.cgi?id=859918
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update hostapd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung