| Summary: | hostapd new security issue fixed upstream in 2.5 (upstream advisory 2015-3, CVE-2015-4142) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/644282/ | ||
| Whiteboard: | has_procedure advisory mga4-32-ok mga4-64-ok | ||
| Source RPM: | hostapd-2.3-2.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-05-07 16:07:10 CEST
David Walser
2015-05-07 16:07:23 CEST
Blocks:
(none) =>
14674 Patched package uploaded for Mageia 4. Advisory: ======================== Updated hostapd packages fix security vulnerability: A vulnerability was found in hostapd that can be used to perform denial of service attacks by an attacker that is within radio range of the AP that uses hostapd for MLME/SME operations. References: http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt ======================== Updated packages in core/updates_testing: ======================== hostapd-2.0-2.2.mga4 from hostapd-2.0-2.2.mga4.src.rpm Version:
Cauldron =>
4 CVE request: http://openwall.com/lists/oss-security/2015/05/07/6 More formal CVE request: http://openwall.com/lists/oss-security/2015/05/09/5 Testing complete mga4 32 Just ensuring it updates cleanly during mga5 final release cycle. Whiteboard:
(none) =>
mga4-32-ok Advisory uploaded. Whiteboard:
mga4-32-ok =>
advisory mga4-32-ok Testing complete mga4 64 Set the wifi device name (from iwconfig) in /etc/hostapd/hostapd.conf and started the hostapd service. Ensured the service was able to restart OK with the update installed. Validating. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0216.html Status:
NEW =>
RESOLVED
David Walser
2015-05-13 20:12:04 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/644282/ CVE-2015-4142 has been assigned for the 2015-3 issue we fixed in this update: http://openwall.com/lists/oss-security/2015/05/31/6 Summary:
hostapd new security issue fixed upstream in 2.5 (upstream advisory 2015-3) =>
hostapd new security issue fixed upstream in 2.5 (upstream advisory 2015-3, CVE-2015-4142) (In reply to David Walser from comment #8) > CVE-2015-4142 has been assigned for the 2015-3 issue we fixed in this update: > http://openwall.com/lists/oss-security/2015/05/31/6 LWN reference with the recent CVEs: http://lwn.net/Vulnerabilities/647929/ |