HomeFreeBSD

MFH: r415527

Description

MFH: r415527

security/wpa_supplicant: Add security patch set 2016-1

A vulnerability was found in how hostapd and wpa_supplicant writes the
configuration file update for the WPA/WPA2 passphrase parameter. If this
parameter has been updated to include control characters either through
a WPS operation (CVE-2016-4476) or through local configuration change
over the wpa_supplicant control interface (CVE-2016-4477), the resulting
configuration file may prevent the hostapd and wpa_supplicant from
starting when the updated file is used. In addition for wpa_supplicant,
it may be possible to load a local library file and execute code from
there with the same privileges under which the wpa_supplicant process
runs.

These patches were developed upstream and published as a response
to the security advisories CVE-2016-4476 and CVE-2016-4477.

PR: 209564
Requested by: Sevan Janiyan
Security: CVE-2016-4477
Security: CVE-2016-4476
Security: https://vuxml.FreeBSD.org/freebsd/967b852b-1e28-11e6-8dd3-002590263bf5.html
Approved by: ports-secteam (with hat)

Details

Provenance
junovitchAuthored on
Parents
rP415536: Document wpa_supplicant security advisory 2016-1
Branches
Unknown
Tags
Unknown