wpa: CVE-2015-5316: EAP-pwd peer error path failure on unexpected Confirm message

Related Vulnerabilities: CVE-2015-5316   CVE-2015-5310   CVE-2015-5314   CVE-2015-5315  

Debian Bug report logs - #804710
wpa: CVE-2015-5316: EAP-pwd peer error path failure on unexpected Confirm message

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 10 Nov 2015 19:00:15 UTC

Severity: serious

Tags: fixed-upstream, patch, security, upstream

Found in version wpa/2.3-1

Fixed in versions wpa/2.3-1+deb8u3, wpa/2.3-2.3

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>:
Bug#804710; Package src:wpa. (Tue, 10 Nov 2015 19:00:18 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>. (Tue, 10 Nov 2015 19:00:18 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: wpa: CVE-2015-5316: EAP-pwd peer error path failure on unexpected Confirm message
Date: Tue, 10 Nov 2015 19:44:28 +0100
Source: wpa
Version: 2.3-1
Severity: important
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerability was published for wpa.

CVE-2015-5316[0]:
EAP-pwd peer error path failure on unexpected Confirm message

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-5316

Regards,
Salvatore



Marked as fixed in versions wpa/2.3-1+deb8u3. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 10 Nov 2015 19:57:05 GMT) (full text, mbox, link).


Severity set to 'serious' from 'important' Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 10 Nov 2015 20:27:26 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>:
Bug#804710; Package src:wpa. (Tue, 10 Nov 2015 20:30:10 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>. (Tue, 10 Nov 2015 20:30:10 GMT) (full text, mbox, link).


Message #14 received at 804710@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 804707@bugs.debian.org, 804708@bugs.debian.org, 804710@bugs.debian.org
Subject: Increasing severity to serious (RC)
Date: Tue, 10 Nov 2015 21:27:15 +0100
Hi

I increased the severity of these bugs since fixes included in
jessie-security and should as well be in stretch, so marking these as
RC.

Regards,
Salvatore



Added tag(s) pending. Request was from Salvatore Bonaccorso <carnil@debian.org> to 804707-submit@bugs.debian.org. (Thu, 12 Nov 2015 20:33:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>:
Bug#804710; Package src:wpa. (Thu, 12 Nov 2015 20:33:11 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>. (Thu, 12 Nov 2015 20:33:11 GMT) (full text, mbox, link).


Message #21 received at 804710@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 804707@bugs.debian.org, 804708@bugs.debian.org, 804710@bugs.debian.org
Subject: wpa: diff for NMU version 2.3-2.3
Date: Thu, 12 Nov 2015 21:29:13 +0100
[Message part 1 (text/plain, inline)]
Control: tags 804707 + pending
Control: tags 804708 + pending
Control: tags 804710 + pending

Dear maintainer,

I've prepared an NMU for wpa (versioned as 2.3-2.3) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
[wpa-2.3-2.3-nmu.diff (text/x-diff, attachment)]

Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Sat, 14 Nov 2015 21:42:15 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sat, 14 Nov 2015 21:42:15 GMT) (full text, mbox, link).


Message #26 received at 804710-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 804710-close@bugs.debian.org
Subject: Bug#804710: fixed in wpa 2.3-2.3
Date: Sat, 14 Nov 2015 21:38:57 +0000
Source: wpa
Source-Version: 2.3-2.3

We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 804710@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated wpa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 12 Nov 2015 20:54:12 +0100
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.3-2.3
Distribution: unstable
Urgency: high
Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 804707 804708 804710
Description: 
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Changes:
 wpa (2.3-2.3) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Add patch to address CVE-2015-5310.
     CVE-2015-5310: wpa_supplicant unauthorized WNM Sleep Mode GTK control.
     (Closes: #804707)
   * Add patches to address CVE-2015-5314 and CVE-2015-5315.
     CVE-2015-5314: hostapd: EAP-pwd missing last fragment length validation.
     CVE-2015-5315: wpa_supplicant: EAP-pwd missing last fragment length
     validation. (Closes: #804708)
   * Add patch to address CVE-2015-5316.
     CVE-2015-5316: EAP-pwd peer error path failure on unexpected Confirm
     message. (Closes: #804710)
Checksums-Sha1: 
 e8e7578c849176b1dac79e90d7bea58bf96175be 2444 wpa_2.3-2.3.dsc
 cf0c60abfffd5c3ed98de1f326d9196a0e20e457 86156 wpa_2.3-2.3.debian.tar.xz
Checksums-Sha256: 
 1bcd69263a5c1c576fd5307170e1b3056824092645ff5d78cee479be0265a8f7 2444 wpa_2.3-2.3.dsc
 aebdeda11461e93d7f37df5f45643a3fc3c203853c884d983ed4f558604f0b2f 86156 wpa_2.3-2.3.debian.tar.xz
Files: 
 1092a250835965dadc10ae9d531539ef 2444 net optional wpa_2.3-2.3.dsc
 38dedea3056ee103fb70c544ae1b99b8 86156 net optional wpa_2.3-2.3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+P4D
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 31 Jan 2016 07:26:09 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:52:27 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.