openSUSE Security Update: Recommended update for wpa_supplicant ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:1030-1 Rating: moderate References: #930077 #930078 #930079 Cross-References: CVE-2015-4141 CVE-2015-4142 CVE-2015-4143 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: wpa_supplicant was updated to fix three security issues. The following vulnerabilities were fixed: CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding (boo#930077) CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing (boo#930078) CVE-2015-4143: EAP-pwd missing payload length validation (boo#930079) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-411=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-411=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): wpa_supplicant-2.2-5.7.1 wpa_supplicant-debuginfo-2.2-5.7.1 wpa_supplicant-debugsource-2.2-5.7.1 wpa_supplicant-gui-2.2-5.7.1 wpa_supplicant-gui-debuginfo-2.2-5.7.1 - openSUSE 13.1 (i586 x86_64): wpa_supplicant-2.0-3.14.1 wpa_supplicant-debuginfo-2.0-3.14.1 wpa_supplicant-debugsource-2.0-3.14.1 wpa_supplicant-gui-2.0-3.14.1 wpa_supplicant-gui-debuginfo-2.0-3.14.1 References: https://www.suse.com/security/cve/CVE-2015-4141.html https://www.suse.com/security/cve/CVE-2015-4142.html https://www.suse.com/security/cve/CVE-2015-4143.html https://bugzilla.suse.com/930077 https://bugzilla.suse.com/930078 https://bugzilla.suse.com/930079