Multiple vulnerabilities have been found in hostapd and wpa_supplicant, allowing remote attackers to execute arbitrary code or cause Denial of Service.
|Package||net-wireless/hostapd on all architectures|
|Affected versions||< 2.5|
|Unaffected versions||>= 2.5|
|Package||net-wireless/wpa_supplicant on all architectures|
|Affected versions||< 2.5-r1|
|Unaffected versions||>= 2.5-r1|
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE 802.11i / RSN). hostapd is a user space daemon for access point and authentication servers.
Multiple vulnerabilities exist in both hostapd and wpa_supplicant. Please review the CVE identifiers for more information.
Remote attackers could execute arbitrary code with the privileges of the process or cause Denial of Service.
There is no known workaround at this time.
All hostapd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.5"
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-2.5-r1"