ALT-BU-2025-14051-1
Branch c10f2 update bulletin.
Package wpa_supplicant updated to version 2.11-alt4 for branch c10f2 in task 398839.
Closed vulnerabilities
Modified: 2025-11-19
BDU:2024-01426
Уязвимость реализации протокола PEAP (Protected Extensible Authentication Protocol) клиента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю перехватить незашифрованный транзитный трафик пользователя
Modified: 2025-11-04
CVE-2023-52160
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
- https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/
- https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c
- https://www.top10vpn.com/research/wifi-vulnerabilities/
- https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QU6IR4KV3ZXJZLK2BY7HAHGZNCP7FPNI/
- https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c
- https://www.top10vpn.com/research/wifi-vulnerabilities/
Closed bugs
не работает wifi на ноутбуке с BCM4352, после обновления с пакетом wpa_supplicant-2.11
wpa_supplicant: спамит сообщениями CTRL-EVENT-SIGNAL-CHANGE
Closed vulnerabilities
Modified: 2025-11-17
BDU:2025-07430
Уязвимость механизма обработки PDF-файлов пакета антивирусных программ ClamAV, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-03
CVE-2025-20260
A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
Closed bugs
файл из libclamav12-1.4.3-alt1.x86_64 конфликтует с файлом из пакета libclamav9-0.103.12-alt1.x86_64