Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.13.2021.362.01
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2021-362-01)
Summary:The remote host is missing an update for the 'wpa_supplicant' package(s) announced via the SSA:2021-362-01 advisory.
Description:Summary:
The remote host is missing an update for the 'wpa_supplicant' package(s) announced via the SSA:2021-362-01 advisory.

Vulnerability Insight:
New wpa_supplicant packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/wpa_supplicant-2.9-i586-1_slack14.2.txz: Upgraded.
This update fixes the following security issues:
AP mode PMF disconnection protection bypass.
UPnP SUBSCRIBE misbehavior in hostapd WPS AP.
P2P group information processing vulnerability.
P2P provision discovery processing vulnerability.
ASN.1: Validate DigestAlgorithmIdentifier parameters.
Flush pending control interface message for an interface to be removed.
These issues could result in a denial-of-service, privilege escalation,
arbitrary code execution, or other unexpected behavior.
Thanks to nobodino for pointing out the patches.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'wpa_supplicant' package(s) on Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.9

CVSS Vector:
AV:A/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-16275
Bugtraq: 20190929 [SECURITY] [DSA 4538-1] wpa security update (Google Search)
https://seclists.org/bugtraq/2019/Sep/56
Debian Security Information: DSA-4538 (Google Search)
https://www.debian.org/security/2019/dsa-4538
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/
https://w1.fi/security/2019-7/
https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
https://www.openwall.com/lists/oss-security/2019/09/11/7
https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/12/6
https://usn.ubuntu.com/4136-1/
https://usn.ubuntu.com/4136-2/
Common Vulnerability Exposure (CVE) ID: CVE-2020-12695
Debian Security Information: DSA-4806 (Google Search)
https://www.debian.org/security/2020/dsa-4806
Debian Security Information: DSA-4898 (Google Search)
https://www.debian.org/security/2021/dsa-4898
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/
http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html
https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/
https://github.com/corelight/callstranger-detector
https://github.com/yunuscadirci/CallStranger
https://www.callstranger.com
https://www.kb.cert.org/vuls/id/339275
https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of
https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html
http://www.openwall.com/lists/oss-security/2020/06/08/2
https://usn.ubuntu.com/4494-1/
Common Vulnerability Exposure (CVE) ID: CVE-2021-0326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMHPFCON6ZFCGZXSASJFKQ3UX2UIYMND/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOSA6DZUDLVOCYJNNXD6V3MRBVLCXZFH/
https://source.android.com/security/bulletin/2021-02-01
https://lists.debian.org/debian-lts-announce/2021/02/msg00033.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-0535
https://source.android.com/security/bulletin/pixel/2021-06-01
Common Vulnerability Exposure (CVE) ID: CVE-2021-27803
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEHS2CFGH3KCSNPHBHNGN5SGV6QPMLZ4/
https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt
https://www.openwall.com/lists/oss-security/2021/02/25/3
https://lists.debian.org/debian-lts-announce/2021/03/msg00003.html
http://www.openwall.com/lists/oss-security/2021/02/27/1
Common Vulnerability Exposure (CVE) ID: CVE-2021-30004
https://security.gentoo.org/glsa/202309-16
https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.