最近收到了服务器有漏洞的通知,提示:RHSA-2021:0808: wpa_supplicant安全更新,主要影响是wpa_supplicant up to 2.9 P2P Provision Discovery Request p2p/p2p_pd.c denial of service,接下来www.gui2000.com就为大家介绍一下wpa_supplicant安全更新的解决方法,有需要的小伙伴可以参考一下:

1、漏洞提示:

RHSA-2021:0808: wpa_supplicant 安全更新

2、漏洞描述:

漏洞编号 漏洞公告 漏洞描述
CVE-2021-27803

wpa_supplicant up to 2.9 P2P Provision Discovery Request p2p/p2p_pd.c denial of service

A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.

3、影响说明:

软件:wpa_supplicant 2.6-12.el7
命中:wpa_supplicant version less than 1:2.6-12.el7_9.2
路径:/etc/dbus-1/system.d/wpa_supplicant.conf

4、受影响软件情况:

5、解决方法:

yum update wpa_supplicant

6、重启验证:

reboot

7、链接参考:

    (1)、http://www.openwall.com/lists/oss-security/2021/02/27/1
    (2)、https://lists.debian.org/debian-lts-announce/2021/03/msg00003.html
    (3)、https:[email protected]dorapr...
    (4)、https:[email protected]dorapr...
    (5)、https:[email protected]dorapr...
    (6)、https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-bas...
    (7)、https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processi...
    (8)、https://www.debian.org/security/2021/dsa-4898
    (9)、https://www.openwall.com/lists/oss-security/2021/02/25/3


以上就是www.gui2000.com为大家介绍的关于wpa_supplicant安全更新的解决方法的全部内容了,希望对大家有所帮助,了解更多相关文章请关注www.gui2000.com网!