|
|
Subscribe / Log in / New account

Scientific Linux alert SLSA-2014:1956-1 (wpa_supplicant)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Moderate: wpa_supplicant on SL7.x x86_64
Date:  Wed, 3 Dec 2014 21:40:33 +0000
Message-ID:  <20141203214033.17236.17808@slpackages.fnal.gov>

Synopsis: Moderate: wpa_supplicant security update Advisory ID: SLSA-2014:1956-1 Issue Date: 2014-12-03 CVE Numbers: CVE-2014-3686 -- A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script (specified using the -a command line option), and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code. (CVE-2014-3686) -- SL7 x86_64 wpa_supplicant-2.0-13.el7_0.x86_64.rpm wpa_supplicant-debuginfo-2.0-13.el7_0.x86_64.rpm - Scientific Linux Development Team


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds