wpa vulnerabilities

Related Vulnerabilities: CVE-2015-5310   CVE-2015-5314   CVE-2015-5315   CVE-2015-5316  

Several security issues were fixed in wpa_supplicant and hostapd.

It was discovered that wpa_supplicant incorrectly handled WMM Sleep Mode Response frame processing. A remote attacker could use this issue to perform broadcast/multicast packet injections, or cause a denial of service. (CVE-2015-5310)

10 November 2015

wpa vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in wpa_supplicant and hostapd.

Software Description

  • wpa - client support for WPA and WPA2

Details

It was discovered that wpa_supplicant incorrectly handled WMM Sleep Mode Response frame processing. A remote attacker could use this issue to perform broadcast/multicast packet injections, or cause a denial of service. (CVE-2015-5310)

It was discovered that wpa_supplicant and hostapd incorrectly handled certain EAP-pwd messages. A remote attacker could use this issue to cause a denial of service. (CVE-2015-5314, CVE-2015-5315)

It was discovered that wpa_supplicant incorrectly handled certain EAP-pwd Confirm messages. A remote attacker could use this issue to cause a denial of service. This issue only applied to Ubuntu 15.10. (CVE-2015-5316)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.10
hostapd - 2.4-0ubuntu3.2
wpasupplicant - 2.4-0ubuntu3.2
Ubuntu 15.04
hostapd - 2.1-0ubuntu7.3
wpasupplicant - 2.1-0ubuntu7.3
Ubuntu 14.04 LTS
hostapd - 2.1-0ubuntu1.4
wpasupplicant - 2.1-0ubuntu1.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References