USN-2808-1: wpa_supplicant and hostapd vulnerabilities
Ubuntu Security Notice USN-2808-1
10th November, 2015
wpa vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in wpa_supplicant and hostapd.
Software description
- wpa - client support for WPA and WPA2
Details
It was discovered that wpa_supplicant incorrectly handled WMM Sleep Mode
Response frame processing. A remote attacker could use this issue to
perform broadcast/multicast packet injections, or cause a denial of
service. (CVE-2015-5310)
It was discovered that wpa_supplicant and hostapd incorrectly handled
certain EAP-pwd messages. A remote attacker could use this issue to cause a
denial of service. (CVE-2015-5314, CVE-2015-5315)
It was discovered that wpa_supplicant incorrectly handled certain EAP-pwd
Confirm messages. A remote attacker could use this issue to cause a
denial of service. This issue only applied to Ubuntu 15.10. (CVE-2015-5316)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 15.10:
- hostapd 2.4-0ubuntu3.2
- wpasupplicant 2.4-0ubuntu3.2
- Ubuntu 15.04:
- hostapd 2.1-0ubuntu7.3
- wpasupplicant 2.1-0ubuntu7.3
- Ubuntu 14.04 LTS:
- hostapd 2.1-0ubuntu1.4
- wpasupplicant 2.1-0ubuntu1.4
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
CVE-2015-5310, CVE-2015-5314, CVE-2015-5315, CVE-2015-5316
from Ubuntu Security Notices http://ift.tt/1NpwJo4