wpa_supplicant-2.10-5.el9

エラータID: AXSA:2024-8014:01

Release date: 
Thursday, May 30, 2024 - 18:31
Subject: 
wpa_supplicant-2.10-5.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.

Security Fix(es):

* wpa_supplicant: potential authorization bypass (CVE-2023-52160)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.4 Release Notes linked from the References section.

CVE-2023-52160
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. wpa_supplicant-2.10-5.el9.src.rpm
    MD5: a89263a9259a2f935d15fcb02d5dd40c
    SHA-256: 4a4c6d64f1b8a028ad5a12a2df56f9277d5931ef49b447663de6d1a4ce3997a5
    Size: 3.38 MB

Asianux Server 9 for x86_64
  1. wpa_supplicant-2.10-5.el9.x86_64.rpm
    MD5: 3fbb2885cb85c022f4b6dea501ef0fe4
    SHA-256: 38f82d3a22176ad8cc29570b07f74b93a069a584b149b1b5bf65508272c26cbf
    Size: 1.55 MB