wpa_supplicant, hostapd: Multiple Vulnerabilities — GLSA 202309-16

Multiple vulnerabilities have been discovered in wpa_supplicant and hostapd, the worst of which could result in arbitrary code execution.

Affected packages

net-wireless/hostapd on all architectures
Affected versions < 2.10
Unaffected versions >= 2.10
net-wireless/wpa_supplicant on all architectures
Affected versions < 2.10
Unaffected versions >= 2.10

Background

wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE 802.11i / RSN). hostapd is a user space daemon for access point and authentication servers.

Description

Multiple vulnerabilities have been discovered in hostapd and wpa_supplicant. Please review the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All wpa_supplicant users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-2.10"
 

All hostapd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.10"
 

References

Release date
September 30, 2023

Latest revision
September 30, 2023: 1

Severity
normal

Exploitable
remote

Bugzilla entries