SCIENTIFIC-LINUX-ERRATA Archives

December 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 3 Dec 2014 21:40:33 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (20 lines)
Synopsis:          Moderate: wpa_supplicant security update
Advisory ID:       SLSA-2014:1956-1
Issue Date:        2014-12-03
CVE Numbers:       CVE-2014-3686
--

A command injection flaw was found in the way the wpa_cli utility executed
action scripts. If wpa_cli was run in daemon mode to execute an action
script (specified using the -a command line option), and wpa_supplicant
was configured to connect to a P2P group, malicious P2P group parameters
could cause wpa_cli to execute arbitrary code. (CVE-2014-3686)
--

SL7
  x86_64
    wpa_supplicant-2.0-13.el7_0.x86_64.rpm
    wpa_supplicant-debuginfo-2.0-13.el7_0.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2