Multiple vulnerabilities have been discovered in wpa_supplicant and hostapd, the worst of which could result in arbitrary code execution.
Package | net-wireless/hostapd on all architectures |
---|---|
Affected versions | < 2.10 |
Unaffected versions | >= 2.10 |
Package | net-wireless/wpa_supplicant on all architectures |
---|---|
Affected versions | < 2.10 |
Unaffected versions | >= 2.10 |
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE 802.11i / RSN). hostapd is a user space daemon for access point and authentication servers.
Multiple vulnerabilities have been discovered in hostapd and wpa_supplicant. Please review the CVE identifiers referenced below for details.
Please review the referenced CVE identifiers for details.
There is no known workaround at this time.
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-2.10"
All hostapd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.10"