Package name
Advisory ID
Affected versions
2011 i586 , 2011 x86_64

Problem description

Multiple vulnerabilities has been discovered and corrected in hostapd:

hostapd 0.7.3, and possibly other versions before 1.0, uses 0644
permissions for /etc/hostapd/hostapd.conf, which might allow
local users to obtain sensitive information such as credentials

Heap-based buffer overflow in the eap_server_tls_process_fragment
function in eap_server_tls_common.c in the EAP authentication server
in hostapd 0.6 through 1.0 allows remote attackers to cause a denial
of service (crash or abort) via a small TLS Message Length value in
an EAP-TLS message with the More Fragments flag set (CVE-2012-4445).

The updated packages have been patched to correct these issues.

Updated packages

2011 i586

 8fa9981eaf73dd9e84b62b42e300211a  2011/i586/hostapd-0.7.3-2.3-mdv2011.0.i586.rpm 
 912f917c8f0d5c8d146d544f9099cc29  2011/SRPMS/hostapd-0.7.3-2.3.src.rpm

2011 x86_64

 4d692e59b6e55c1cc9292315fcc0570a  2011/x86_64/hostapd-0.7.3-2.3-mdv2011.0.x86_64.rpm 
 912f917c8f0d5c8d146d544f9099cc29  2011/SRPMS/hostapd-0.7.3-2.3.src.rpm