hostapd and wpa_supplicant: Multiple vulnerabilities — GLSA 201606-17

Multiple vulnerabilities have been found in hostapd and wpa_supplicant, allowing remote attackers to execute arbitrary code or cause Denial of Service.

Affected packages

net-wireless/hostapd on all architectures
Affected versions < 2.5
Unaffected versions >= 2.5
net-wireless/wpa_supplicant on all architectures
Affected versions < 2.5-r1
Unaffected versions >= 2.5-r1

Background

wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE 802.11i / RSN). hostapd is a user space daemon for access point and authentication servers.

Description

Multiple vulnerabilities exist in both hostapd and wpa_supplicant. Please review the CVE identifiers for more information.

Impact

Remote attackers could execute arbitrary code with the privileges of the process or cause Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All hostapd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.5"
 

All wpa_supplicant users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=net-wireless/wpa_supplicant-2.5-r1"
 

References

Release date
June 27, 2016

Latest revision
June 27, 2016: 1

Severity
normal

Exploitable
remote

Bugzilla entries