Revision Date: | 2021-04-12 | Version: | 1 |
Title: | Security update for hostapd (Important) |
Description: |
This update for hostapd fixes the following issues:
- CVE-2021-30004: forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c (boo#1184348) - CVE-2020-12695: UPnP SUBSCRIBE misbehavior in hostapd WPS AP (boo#1172700) - CVE-2019-16275: AP mode PMF disconnection protection bypass (boo#1150934)
- added AppArmor profile (source apparmor-usr.sbin.hostapd)
This update was imported from the openSUSE:Leap:15.2:Update update project.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1150934 1172700 1184348 CVE-2019-16275 CVE-2020-12695 CVE-2021-30004 openSUSE-SU-2021:0545-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2 SUSE Linux Enterprise Storage 7 SUSE Manager Proxy 4.1 SUSE Manager Server 4.1 SUSE Package Hub for SUSE Linux Enterprise 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Package Hub for SUSE Linux Enterprise 15 SP2 is installed AND hostapd-2.9-bp152.2.3.1 is installed
|