ELSA-2018-3107 - wpa_supplicant security and bug fix update
Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2018-11-05 |
Description
[1:2.6-12]
- Ignore unauthenticated encrypted EAPOL-Key data (CVE-2018-14526)
[1:2.6-11]
- Better handling of /run/wpa_supplicant (rh #1507919)
[1:2.6-10]
- Fix memory leak when macsec MKA/PSK is used (rh #1500442)
- Fix authentication failure when the MAC is updated externally (rh #1490885)
- Let the kernel discard EAPOL if packet type is PACKET_OTHERHOST (rh #1434434)
- Dont restart wpa_supplicant.service on package upgrade (rh #1505404)
- Dont own a directory in /run/ (rh #1507919)
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle Linux 7 (x86_64) | wpa_supplicant-2.6-12.el7.src.rpm | 8efb77a8c2ab91a5ded13c0ec5beeafb | ELSA-2021-0808 |
| wpa_supplicant-2.6-12.el7.x86_64.rpm | aed9bb1eec2ddde1cf84584874d04de5 | ELSA-2021-0808 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team