All errata/c9f1/ALT-PU-2021-1466-1
ALT-PU-2021-1466-1

Package update wpa_supplicant in branch c9f1

Version2.9-alt4
Published2021-03-11
Max severityHIGH
Severity:

Closed issues (4)

BDU:2019-04775
MEDIUM6.5

Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании

Published: 2019-12-22Modified: 2025-03-05
CVSS 3.xMEDIUM 6.5
CVSS:3.x/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.0LOW 3.3
CVSS:2.0/AV:A/AC:L/Au:N/C:N/I:N/A:P
References
BDU:2021-01584
HIGH7.5

Уязвимость компонента p2p/p2p_pd.c клиента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

Published: 2021-03-30Modified: 2023-11-21
CVSS 3.xHIGH 7.5
CVSS:3.x/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.0MEDIUM 5.4
CVSS:2.0/AV:A/AC:M/Au:N/C:P/I:P/A:P
References
CVE-2019-16275
MEDIUM6.5

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

Published: 2019-09-12Modified: 2024-11-21
CVSS 2.0LOW 3.3
CVSS:2.0/AV:A/AC:L/Au:N/C:N/I:N/A:P
CVSS 3.xMEDIUM 6.5
CVSS:3.x/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
CVE-2021-27803
HIGH7.5

A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.

Published: 2021-02-26Modified: 2025-12-18
CVSS 2.0MEDIUM 5.4
CVSS:2.0/AV:A/AC:M/Au:N/C:P/I:P/A:P
CVSS 3.xHIGH 7.5
CVSS:3.x/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
References

Closed bugs (1)