CVE-2015-4141
Publication date 1 June 2015
Last updated 24 July 2024
Ubuntu priority
The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
hostapd | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
wpa | ||
16.04 LTS xenial |
Fixed 2.1-0ubuntu8
|
|
14.04 LTS trusty |
Fixed 2.1-0ubuntu1.3
|
|
wpasupplicant | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
hostapd | |
wpa | |
wpasupplicant |
References
Related Ubuntu Security Notices (USN)
- USN-2650-1
- wpa_supplicant and hostapd vulnerabilities
- 16 June 2015