FS#68861 - [hostapd] [Security] proxy injection (CVE-2020-12695)
Attached to Project:
Community Packages
Opened by Jonas Witschel (diabonas) - Saturday, 05 December 2020, 19:42 GMT
Last edited by David Runge (dvzrv) - Sunday, 06 December 2020, 17:27 GMT
Opened by Jonas Witschel (diabonas) - Saturday, 05 December 2020, 19:42 GMT
Last edited by David Runge (dvzrv) - Sunday, 06 December 2020, 17:27 GMT
|
Details
Summary
======= The package hostapd is vulnerable to proxy injection via CVE-2020-12695. Guidance ======== Upstream recommends applying the three patches referenced below until the next version 2.10 of hostapd is available, which does not appear to be the case yet. References ========== https://security.archlinux.org/AVG-1322 https://w1.fi/security/2020-1/upnp-subscribe-misbehavior-wps-ap.txt http://www.callstranger.com/ https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch |
This task depends upon
Closed by David Runge (dvzrv)
Sunday, 06 December 2020, 17:27 GMT
Reason for closing: Fixed
Additional comments about closing: Patches applied in 2.9-4
Sunday, 06 December 2020, 17:27 GMT
Reason for closing: Fixed
Additional comments about closing: Patches applied in 2.9-4
Comment by David Runge (dvzrv) -
Sunday, 06 December 2020, 17:20 GMT
@diabonas: Thanks for the report. I will rebuild the package with
the patches applied.