CVE-2015-5310

NameCVE-2015-5310
DescriptionWi-Fi in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows remote attackers to obtain sensitive Wi-Fi information by leveraging access to the local physical environment, aka internal bug 25266660.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3397-1
NVD severitylow (attack range: remote)
Debian Bugs804707

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)wheezy1.0-3+deb7u3fixed
wheezy (security)1.0-3+deb7u4fixed
jessie2.3-1+deb8u4fixed
jessie (security)2.3-1+deb8u5fixed
stretch2:2.4-1fixed
stretch (security)2:2.4-1+deb9u1fixed
buster, sid2:2.4-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
hostapdsource(unstable)(not affected)
wpasource(unstable)2.3-2.3low804707
wpasourcejessie2.3-1+deb8u3lowDSA-3397-1
wpasourcewheezy1.0-3+deb7u3lowDSA-3397-1
wpasupplicantsource(unstable)(not affected)

Notes

[wheezy] - wpa <not-affected> (v2.0-v2.5 with CONFIG_WNM=y)
- wpasupplicant <not-affected> (v2.0-v2.5 with CONFIG_WNM=y)
- hostapd <not-affected> (v2.0-v2.5 with CONFIG_WNM=y)
http://w1.fi/security/2015-6/
https://w1.fi/security/2015-6/0001-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch
https://w1.fi/security/2015-6/wpa_supplicant-unauthorized-wnm-sleep-mode-gtk-control.txt

Search for package or bug name: Reporting problems