SUSE-SU-2016:2305-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20162305-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:2305-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:2305-1
Related
Published
2016-09-14T13:37:15Z
Modified
2016-09-14T13:37:15Z
Summary
Security update for wpa_supplicant
Details

This update for wpa_supplicant fixes the following issues:

  • CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding. (bnc#930077)
  • CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing. (bnc#930078)
  • CVE-2015-4143: EAP-pwd missing payload length validation. (bnc#930079)
  • CVE-2015-5310: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in use. (bsc#952254)
  • CVE-2015-8041: Fix payload length validation in NDEF record parser. (bsc#937419)
References

Affected packages

SUSE:Linux Enterprise Desktop 12 SP1 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
purl:rpm/suse/wpa_supplicant&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2-14.2

Ecosystem specific

{
    "binaries": [
        {
            "wpa_supplicant": "2.2-14.2"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP1 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
purl:rpm/suse/wpa_supplicant&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2-14.2

Ecosystem specific

{
    "binaries": [
        {
            "wpa_supplicant": "2.2-14.2"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP1 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
purl:rpm/suse/wpa_supplicant&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2-14.2

Ecosystem specific

{
    "binaries": [
        {
            "wpa_supplicant": "2.2-14.2"
        }
    ]
}