SUSE-SU-2015:1013-1: moderate: Security update for wpa_supplicant
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Jun 9 02:04:57 MDT 2015
SUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1013-1
Rating: moderate
References: #900611 #915323 #927558
Cross-References: CVE-2014-3686 CVE-2015-0210 CVE-2015-1863
Affected Products:
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
wpa_supplicant was updated to fix three security issues:
- CVE-2015-0210: wpa_supplicant: broken certificate subject check this
adds the "domain_match" config option from upstream (additional to the
already existing domain_suffix_match)
- CVE-2014-3686: hostapd command execution
- CVE-2015-1863: P2P SSID processing vulnerability
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-244=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-244=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
wpa_supplicant-2.2-8.1
wpa_supplicant-debuginfo-2.2-8.1
wpa_supplicant-debugsource-2.2-8.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
wpa_supplicant-2.2-8.1
wpa_supplicant-debuginfo-2.2-8.1
wpa_supplicant-debugsource-2.2-8.1
References:
https://www.suse.com/security/cve/CVE-2014-3686.html
https://www.suse.com/security/cve/CVE-2015-0210.html
https://www.suse.com/security/cve/CVE-2015-1863.html
https://bugzilla.suse.com/900611
https://bugzilla.suse.com/915323
https://bugzilla.suse.com/927558
More information about the sle-security-updates
mailing list