You are here
Home > Preporuke > Sigurnosni nedostaci programskih paketa wpa i wpasupplicant

Sigurnosni nedostaci programskih paketa wpa i wpasupplicant

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2650-1
June 16, 2015

wpa, wpasupplicant vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

wpa_supplicant and hostapd could be made to crash if they received
specially crafted network traffic.

Software Description:
– wpa: client support for WPA and WPA2
– wpasupplicant: client support for WPA and WPA2

Details:

Kostya Kortchinsky discovered multiple flaws in wpa_supplicant and hostapd.
A remote attacker could use these issues to cause wpa_supplicant or hostapd
to crash, resulting in a denial of service. (CVE-2015-4141, CVE-2015-4142,
CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
hostapd 2.1-0ubuntu7.2
wpasupplicant 2.1-0ubuntu7.2

Ubuntu 14.10:
hostapd 2.1-0ubuntu4.2
wpasupplicant 2.1-0ubuntu4.2

Ubuntu 14.04 LTS:
hostapd 2.1-0ubuntu1.3
wpasupplicant 2.1-0ubuntu1.3

Ubuntu 12.04 LTS:
wpasupplicant 0.7.3-6ubuntu2.4

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2650-1
CVE-2015-4141, CVE-2015-4142, CVE-2015-4143, CVE-2015-4144,
CVE-2015-4145, CVE-2015-4146

Package Information:
https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu7.2
https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu4.2
https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/wpasupplicant/0.7.3-6ubuntu2.4

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=yjBy
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2015-06-0006-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-1_7_0-ibm

Otkriveni su sigurnosni nedostaci u programskom paketu java-1_7_0-ibm za operacijski sustav Suse. Otkriveni nedostaci potencijalnim napadačima omogućuju da prisile uspostavljanje...

Close