Bug 23412 - wpa_supplicant new security issue CVE-2018-14526
Summary: wpa_supplicant new security issue CVE-2018-14526
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: mga6-64-ok, mga6-32-ok
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2018-08-09 03:53 CEST by David Walser
Modified: 2018-08-19 20:37 CEST (History)
4 users (show)

See Also:
Source RPM: wpa_supplicant-2.6-5.mga7.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2018-08-09 03:53:59 CEST
Upstream has issued an advisory today (August 8):
https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt

Patches are available in the same directory and it will be fixed in 2.7.

Mageia 5 and Mageia 6 are also affected.
David Walser 2018-08-09 03:54:11 CEST

Whiteboard: (none) => MGA6TOO

Comment 1 Marja Van Waes 2018-08-09 20:57:06 CEST
Assigning to the registered maintainer.

Assignee: bugsquad => tmb
CC: (none) => marja11

Comment 2 David Walser 2018-08-16 19:57:03 CEST
Fedora has issued an advisory for this today (August 16):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PEFP3OPDXRDJ2KHPPUJVDHUNXFNZFN7Q/
Comment 3 David GEIGER 2018-08-17 09:31:29 CEST
Done for Cauldron!

For mga6 can I sync it with Cauldron one to switch the gui to Qt5?

CC: (none) => geiger.david68210

Comment 4 Thomas Backlund 2018-08-17 09:36:36 CEST
(In reply to David GEIGER from comment #3)
> Done for Cauldron!
> 

Thanks.

> For mga6 can I sync it with Cauldron one to switch the gui to Qt5?


Go ahead.
Comment 5 David GEIGER 2018-08-17 10:03:28 CEST
So done also for mga6 adding the patch and porting the gui to Qt5!
Comment 6 David Walser 2018-08-17 16:54:03 CEST
Advisory:
========================

Updated wpa_supplicant packages fix security vulnerability:

An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6.
Under certain conditions, the integrity of EAPOL-Key messages is not checked,
leading to a decryption oracle. An attacker within range of the Access Point
and client can abuse the vulnerability to recover sensitive information
(CVE-2018-14526).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526
https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PEFP3OPDXRDJ2KHPPUJVDHUNXFNZFN7Q/
========================

Updated packages in core/updates_testing:
========================
wpa_supplicant-2.6-1.2.mga6
wpa_supplicant-gui-2.6-1.2.mga6

from wpa_supplicant-2.6-1.2.mga6.src.rpm

CC: (none) => tmb
Whiteboard: MGA6TOO => (none)
Assignee: tmb => qa-bugs
Version: Cauldron => 6

Comment 7 Thomas Backlund 2018-08-17 23:07:19 CEST
Works here on x86_64

Whiteboard: (none) => MGA6-64-OK

Thomas Backlund 2018-08-17 23:11:39 CEST

Keywords: (none) => advisory

Comment 8 Thomas Backlund 2018-08-19 20:11:43 CEST
works on 32bit too, validating

Keywords: (none) => validated_update
Whiteboard: MGA6-64-OK => mga6-64-ok, mga6-32-ok
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2018-08-19 20:37:46 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2018-0348.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.