A vulnerability in hostapd and wpa_supplicant could lead to a Denial of Service condition.
Package | net-wireless/hostapd on all architectures |
---|---|
Affected versions | < 2.8 |
Unaffected versions | >= 2.8 |
Package | net-wireless/wpa_supplicant on all architectures |
---|---|
Affected versions | < 2.8 |
Unaffected versions | >= 2.8 |
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE 802.11i / RSN).
hostapd is a user space daemon for access point and authentication servers.
A vulnerability was discovered in hostapd’s and wpa_supplicant’s eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c files.
An attacker could cause a possible Denial of Service condition.
There is no known workaround at this time.
All hostapd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.8"
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-2.8"