FS#44695 - [wpa_supplicant] CVE2015-1863
Attached to Project:
Arch Linux
Opened by Ingo Albrecht (indigo) - Wednesday, 22 April 2015, 23:18 GMT
Last edited by Evangelos Foutras (foutrelis) - Friday, 24 April 2015, 18:47 GMT
Opened by Ingo Albrecht (indigo) - Wednesday, 22 April 2015, 23:18 GMT
Last edited by Evangelos Foutras (foutrelis) - Friday, 24 April 2015, 18:47 GMT
|
Details
Description:
A vulnerability CVE2015-1863 was found in wpa_supplicant <version 2.5 and confirmed upstream [1] that could result in corrupted state in heap, unexpected program behavior due to corrupted P2P peer device information, denial of service due to wpa_supplicant process crash, exposure of memory contents during GO Negotiation, and potentially arbitrary code execution. For mitigation until wpa_supplicant is updated, patches are linked in [1], further it is advised to rebuild disabling CONFIG_P2P in [2]. Additional info: [1] http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt [2] https://projects.archlinux.org/svntogit/packages.git/tree/trunk/config?h=packages/wpa_supplicant#n471 |
This task depends upon
Closed by Evangelos Foutras (foutrelis)
Friday, 24 April 2015, 18:47 GMT
Reason for closing: Fixed
Additional comments about closing: wpa_supplicant 2.4-1
Friday, 24 April 2015, 18:47 GMT
Reason for closing: Fixed
Additional comments about closing: wpa_supplicant 2.4-1
I recommend that it may make sense to go with the upstream recommendation to apply the provided patch rather then disabling P2P support on build-time as the patch resolves the issue.
Thanks for patching, 2.4-1 works fine here.