First published: Tue Oct 30 2018(Updated: )
The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.<br>Security Fix(es):<br><li> wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant (CVE-2018-14526)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
wpa_supplicant |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2018:3107 is classified as important.
To fix RHSA-2018:3107, update the wpa_supplicant package to the latest version provided by your vendor.
RHSA-2018:3107 addresses multiple security vulnerabilities found in the wpa_supplicant packages.
All users and systems running vulnerable versions of the wpa_supplicant package are affected by RHSA-2018:3107.
If you are affected by RHSA-2018:3107, you should promptly apply the necessary updates to mitigate the risks.