|
|
Subscribe / Log in / New account

wpa_supplicant: code execution

Package(s):wpa_supplicant CVE #(s):CVE-2015-1863
Created:April 24, 2015 Updated:May 13, 2015
Description:

From the Ubuntu advisory:

It was discovered that wpa_supplicant incorrectly handled SSID information when creating or updating P2P peer entries. A remote attacker could use this issue to cause wpa_supplicant to crash, resulting in a denial of service, expose memory contents, or possibly execute arbitrary code.

Alerts:
Gentoo 201606-17 hostapd 2016-06-27
Red Hat RHSA-2015:1090-01 wpa_supplicant 2015-06-11
Fedora FEDORA-2015-6952 wpa_supplicant 2015-05-12
Slackware SSA:2015-132-03 wpa_supplicant 2015-05-12
CentOS CESA-2015:1090 wpa_supplicant 2015-06-15
Scientific Linux SLSA-2015:1090-1 wpa_supplicant 2015-06-11
Oracle ELSA-2015-1090 wpa_supplicant 2015-06-11
openSUSE openSUSE-SU-2015:0813-1 wpa_supplicant 2015-05-01
Fedora FEDORA-2015-6860 wpa_supplicant 2015-04-27
Debian DSA-3233-1 wpa 2015-04-24
Arch Linux ASA-201504-29 wpa_supplicant 2015-04-24
Ubuntu USN-2577-1 wpa_supplicant 2015-04-23

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds