Description: | Summary: The remote host is missing an update for the 'wpa_supplicant' package(s) announced via the SSA:2021-362-01 advisory.
Vulnerability Insight: New wpa_supplicant packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/wpa_supplicant-2.9-i586-1_slack14.2.txz: Upgraded. This update fixes the following security issues: AP mode PMF disconnection protection bypass. UPnP SUBSCRIBE misbehavior in hostapd WPS AP. P2P group information processing vulnerability. P2P provision discovery processing vulnerability. ASN.1: Validate DigestAlgorithmIdentifier parameters. Flush pending control interface message for an interface to be removed. These issues could result in a denial-of-service, privilege escalation, arbitrary code execution, or other unexpected behavior. Thanks to nobodino for pointing out the patches. For more information, see: [links moved to references] (* Security fix *) +--------------------------+
Affected Software/OS: 'wpa_supplicant' package(s) on Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 7.9
CVSS Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C
|