Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <87k2wkfvks.fsf@redhat.com>
Date: Thu, 07 May 2015 13:58:27 +0200
From: Martin Prpic <mprpic@...hat.com>
To: "OSS Security Mailinglist" <oss-security@...ts.openwall.com>
Subject: CVE request: vulnerability in wpa_supplicant and hostapd

Hi, I don't see a CVE assigned for this anywhere:

http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt

"EAP-pwd missing payload length validation

A vulnerability was found in EAP-pwd server and peer implementation used
in hostapd and wpa_supplicant, respectively. The EAP-pwd/Commit and
EAP-pwd/Confirm message payload is processed without verifying that the
received frame is long enough to include all the fields. This results in
buffer read overflow of up to couple of hundred bytes."

Patches are included in: http://w1.fi/security/2015-4/

Thank you!

-- 
Martin Prpič / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.