MGASA-2016-0199

Source
https://advisories.mageia.org/MGASA-2016-0199.html
Import Source
https://advisories.mageia.org/MGASA-2016-0199.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0199
Related
Published
2016-05-21T22:11:24Z
Modified
2016-05-21T22:03:19Z
Summary
Updated wpa_supplicant packages fix security vulnerabilities
Details

Updated wpa_suppliant packages fix security vulnerabilities:

A vulnerability was found in how wpasupplicant writes the configuration file update for the WPA/WPA2 passphrase parameter. If this parameter has been updated to include control characters either through a WPS operation (CVE-2016-4476) or through local configuration change over the wpasupplicant control interface (CVE-2016-4477), the resulting configuration file may prevent the wpasupplicant from starting when the updated file is used. In addition, it may be possible to load a local library file and execute code from there with the same privileges under which the wpasupplicant process runs.

References
Credits

Affected packages

Mageia:5 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:rpm/mageia/wpa_supplicant?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3-3.1.mga5

Ecosystem specific

{
    "section": "core"
}