-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: wpa_supplicant security, bug fix, and enhancement update
Advisory ID:       RHSA-2021:1686-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1686
Issue date:        2021-05-18
CVE Names:         CVE-2021-0326 
====================================================================
1. Summary:

An update for wpa_supplicant is now available for Red Hat Enterprise Linux
8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The wpa_supplicant packages contain an 802.1X Supplicant with support for
WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication
methods. They implement key negotiation with a WPA Authenticator for client
stations and controls the roaming and IEEE 802.11 authentication and
association of the WLAN driver.

Security Fix(es):

* wpa_supplicant: P2P group information processing vulnerability
(CVE-2021-0326)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.4 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1693684 - incorrect handling of p2p_listen (always use p2p_long_listen)
1888050 - Wlan's in a bridge won't do authentication properly when operating in AP mode
1888718 - RFE: export support for OWE via d-bus
1916394 - [RFE] Add  WPA-EAP-SUITE-B-192 (WPA3-Enterprise)
1925152 - CVE-2021-0326 wpa_supplicant: P2P group information processing vulnerability

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
wpa_supplicant-2.9-5.el8.src.rpm

aarch64:
wpa_supplicant-2.9-5.el8.aarch64.rpm
wpa_supplicant-debuginfo-2.9-5.el8.aarch64.rpm
wpa_supplicant-debugsource-2.9-5.el8.aarch64.rpm

ppc64le:
wpa_supplicant-2.9-5.el8.ppc64le.rpm
wpa_supplicant-debuginfo-2.9-5.el8.ppc64le.rpm
wpa_supplicant-debugsource-2.9-5.el8.ppc64le.rpm

s390x:
wpa_supplicant-2.9-5.el8.s390x.rpm
wpa_supplicant-debuginfo-2.9-5.el8.s390x.rpm
wpa_supplicant-debugsource-2.9-5.el8.s390x.rpm

x86_64:
wpa_supplicant-2.9-5.el8.x86_64.rpm
wpa_supplicant-debuginfo-2.9-5.el8.x86_64.rpm
wpa_supplicant-debugsource-2.9-5.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-0326
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYKPw3dzjgjWX9erEAQiFvw/9HNvAA5eUx9iHLTplgK1GXs1uptCWF99b
UHtNLYA3yemcOF1Zp2Ul92Xa0/qbHdPLuJFRekUiXtoTde7MESuKQAoDCSR6aLWz
n6ZjIaKZwOWb/QBYqCfVip68zxct3k9QATKzZIMI7qe28jTzInh4HR5MbyyoN6rg
5Su0cfShuhw+z9TgKX7bGJO7wYjAZ0I8vVOGsp0CCef8FFhC3tp3rcf/hHd+FX/I
uXZ5OZ8pYDwPIJNFfSoA59BIh0RizMdzDzzs2z0I/dycfGftazbW9GzPR8TyQVf3
FCuuNgtSe1qSe4oK3HS+IM+bd2kBWSi7gCUr2abUrePml2ZzMc9qb982qTuBp2oQ
JOXbYTY6+mzKictJ9NpkQG8nQA6rn1JxzxJaM3w9ZIkqMfVtyQfG0aXMjVr9+tsP
zhtCva9sQeAM/SAUptUzpg/Oo4sC+0YE5OQxAFnb3i/vLMr2VQDfzPdC1M6LF5Tp
AwIISgSXSuQldWPGl+1helma8RikXrUpcbcGdZ4nI3sOJbDHrsiHVicNHhEdAGxq
/CA5Gs+z8rhCFSi7pbv5bB1WXPzuWFB3GnIpVQKhqEbQqfYa2cl1tLMKdxz5Yab+
azKHdPAPQCF0yLVNfk8WpuCeXJ5PeBu3BmsiT1fNFz9k27rHRn781CktgFntFAzv
WmlAjTm+tAU=rz0o
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-1686:01 Moderate: wpa_supplicant security, bug fix,

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 8

Summary

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.
Security Fix(es):
* wpa_supplicant: P2P group information processing vulnerability (CVE-2021-0326)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-0326 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

Package List

Red Hat Enterprise Linux BaseOS (v. 8):
Source: wpa_supplicant-2.9-5.el8.src.rpm
aarch64: wpa_supplicant-2.9-5.el8.aarch64.rpm wpa_supplicant-debuginfo-2.9-5.el8.aarch64.rpm wpa_supplicant-debugsource-2.9-5.el8.aarch64.rpm
ppc64le: wpa_supplicant-2.9-5.el8.ppc64le.rpm wpa_supplicant-debuginfo-2.9-5.el8.ppc64le.rpm wpa_supplicant-debugsource-2.9-5.el8.ppc64le.rpm
s390x: wpa_supplicant-2.9-5.el8.s390x.rpm wpa_supplicant-debuginfo-2.9-5.el8.s390x.rpm wpa_supplicant-debugsource-2.9-5.el8.s390x.rpm
x86_64: wpa_supplicant-2.9-5.el8.x86_64.rpm wpa_supplicant-debuginfo-2.9-5.el8.x86_64.rpm wpa_supplicant-debugsource-2.9-5.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:1686-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1686
Issued Date: : 2021-05-18
CVE Names: CVE-2021-0326

Topic

An update for wpa_supplicant is now available for Red Hat Enterprise Linux8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1693684 - incorrect handling of p2p_listen (always use p2p_long_listen)

1888050 - Wlan's in a bridge won't do authentication properly when operating in AP mode

1888718 - RFE: export support for OWE via d-bus

1916394 - [RFE] Add WPA-EAP-SUITE-B-192 (WPA3-Enterprise)

1925152 - CVE-2021-0326 wpa_supplicant: P2P group information processing vulnerability


Related News