Updated wpa_supplicant and hostapd packages fix security vulnerability
Publication date: 28 Oct 2014Modification date: 28 Oct 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-3686
Description
A vulnerability was found in the mechanism wpa_cli and hostapd_cli use for executing action scripts. An unsanitized string received from a remote device can be passed to a system() call resulting in arbitrary command execution under the privileges of the wpa_cli/hostapd_cli process (which may be root in common use cases) (CVE-2014-3686). Using the Mageia wpa_supplicant package, systems are exposed to the vulnerability if operating as a WPS registrar. The Mageia hostapd package was not vulnerable with the configuration with which it was built, but if a sysadmin had rebuilt it with WPS enabled, it would be vulnerable.
References
SRPMS
3/core
- wpa_supplicant-1.1-4.1.mga3
- hostapd-1.1-2.1.mga3
4/core
- wpa_supplicant-2.0-2.1.mga4
- hostapd-2.0-2.1.mga4