Updated wpa_supplicant, hostapd packages fix security vulnerability
Publication date: 13 Jun 2021Modification date: 13 Jun 2021
Type: security
Affected Mageia releases : 7 , 8
CVE: CVE-2021-30004
Description
The wpa_supplicant and hostapd packages are updated to fix a forging attacks that may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. (CVE-2021-30004).
References
- https://bugs.mageia.org/show_bug.cgi?id=29046
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XPNZHCXJ32COQGQ62HNGD6DHPO5E552/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004
SRPMS
8/core
- wpa_supplicant-2.9-8.2.mga8
- hostapd-2.9-5.1.mga8
7/core
- wpa_supplicant-2.9-1.5.mga7
- hostapd-2.9-1.3.mga7