==========================================================================
Ubuntu Security Notice USN-2808-1
November 10, 2015
wpa vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.10
– Ubuntu 15.04
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in wpa_supplicant and hostapd.
Software Description:
– wpa: client support for WPA and WPA2
Details:
It was discovered that wpa_supplicant incorrectly handled WMM Sleep Mode
Response frame processing. A remote attacker could use this issue to
perform broadcast/multicast packet injections, or cause a denial of
service. (CVE-2015-5310)
It was discovered that wpa_supplicant and hostapd incorrectly handled
certain EAP-pwd messages. A remote attacker could use this issue to cause a
denial of service. (CVE-2015-5314, CVE-2015-5315)
It was discovered that wpa_supplicant incorrectly handled certain EAP-pwd
Confirm messages. A remote attacker could use this issue to cause a
denial of service. This issue only applied to Ubuntu 15.10. (CVE-2015-5316)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
hostapd 2.4-0ubuntu3.2
wpasupplicant 2.4-0ubuntu3.2
Ubuntu 15.04:
hostapd 2.1-0ubuntu7.3
wpasupplicant 2.1-0ubuntu7.3
Ubuntu 14.04 LTS:
hostapd 2.1-0ubuntu1.4
wpasupplicant 2.1-0ubuntu1.4
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2808-1
CVE-2015-5310, CVE-2015-5314, CVE-2015-5315, CVE-2015-5316
Package Information:
https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu3.2
https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu7.3
https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.4
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=+mKN
—–END PGP SIGNATURE—–
—