openSUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:0813-1
Rating:             important
References:         #927558 
Cross-References:   CVE-2015-1863
Affected Products:
                    openSUSE 13.2
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   The wireless network encryption and authentication daemon wpa_supplicant
   was updated to fix a security issue.

   The following vulnerability was fixed:

   * CVE-2015-1863: A buffer overflow in handling SSIDs in P2P management
     frames allowed attackers in radio range to crash, expose memory content
     or potentially execute arbitrary code.


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2015-341=1

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2015-341=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      wpa_supplicant-2.2-5.4.1
      wpa_supplicant-debuginfo-2.2-5.4.1
      wpa_supplicant-debugsource-2.2-5.4.1
      wpa_supplicant-gui-2.2-5.4.1
      wpa_supplicant-gui-debuginfo-2.2-5.4.1

   - openSUSE 13.1 (i586 x86_64):

      wpa_supplicant-2.0-3.11.1
      wpa_supplicant-debuginfo-2.0-3.11.1
      wpa_supplicant-debugsource-2.0-3.11.1
      wpa_supplicant-gui-2.0-3.11.1
      wpa_supplicant-gui-debuginfo-2.0-3.11.1


References:

   https://www.suse.com/security/cve/CVE-2015-1863.html
   https://bugzilla.suse.com/927558

-- 

openSUSE: 2015:0813-1: important: wpa_supplicant

May 1, 2015
An update that fixes one vulnerability is now available.

Description

The wireless network encryption and authentication daemon wpa_supplicant was updated to fix a security issue. The following vulnerability was fixed: * CVE-2015-1863: A buffer overflow in handling SSIDs in P2P management frames allowed attackers in radio range to crash, expose memory content or potentially execute arbitrary code.

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-341=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-341=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.2 (i586 x86_64): wpa_supplicant-2.2-5.4.1 wpa_supplicant-debuginfo-2.2-5.4.1 wpa_supplicant-debugsource-2.2-5.4.1 wpa_supplicant-gui-2.2-5.4.1 wpa_supplicant-gui-debuginfo-2.2-5.4.1 - openSUSE 13.1 (i586 x86_64): wpa_supplicant-2.0-3.11.1 wpa_supplicant-debuginfo-2.0-3.11.1 wpa_supplicant-debugsource-2.0-3.11.1 wpa_supplicant-gui-2.0-3.11.1 wpa_supplicant-gui-debuginfo-2.0-3.11.1


References

https://www.suse.com/security/cve/CVE-2015-1863.html https://bugzilla.suse.com/927558--


Severity
Announcement ID: openSUSE-SU-2015:0813-1
Rating: important
Affected Products: openSUSE 13.2 openSUSE 13.1

Related News