Scientific Linux alert SLSA-2014:1956-1 (wpa_supplicant)
| From: | Pat Riehecky <riehecky@fnal.gov> | |
| To: | <scientific-linux-errata@listserv.fnal.gov> | |
| Subject: | Security ERRATA Moderate: wpa_supplicant on SL7.x x86_64 | |
| Date: | Wed, 3 Dec 2014 21:40:33 +0000 | |
| Message-ID: | <20141203214033.17236.17808@slpackages.fnal.gov> |
Synopsis: Moderate: wpa_supplicant security update Advisory ID: SLSA-2014:1956-1 Issue Date: 2014-12-03 CVE Numbers: CVE-2014-3686 -- A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script (specified using the -a command line option), and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code. (CVE-2014-3686) -- SL7 x86_64 wpa_supplicant-2.0-13.el7_0.x86_64.rpm wpa_supplicant-debuginfo-2.0-13.el7_0.x86_64.rpm - Scientific Linux Development Team
