Debian Security Advisory

DLA-1733-1 wpa -- LTS security update

Date Reported:
28 Mar 2019
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CVE-2016-10743.
More information:

It was found that the fallback mechanism for generating a WPS pin in hostapd, an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator, used a low quality pseudorandom number generator. This was resolved by using only the high quality os_get_random function.

For Debian 8 Jessie, this problem has been fixed in version 2.3-1+deb8u7.

We recommend that you upgrade your wpa packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: