[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2318-1] wpa security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -----------------------------------------------------------------------
Debian LTS Advisory DLA-2318-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
August 09, 2020                             https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : wpa
Version        : 2:2.4-1+deb9u7
CVE ID         : CVE-2019-10064 CVE-2020-12695

The following CVE(s) have been reported against src:wpa.

CVE-2019-10064

    hostapd before 2.6, in EAP mode, makes calls to the rand()
    and random() standard library functions without any preceding
    srand() or srandom() call, which results in inappropriate
    use of deterministic values. This was fixed in conjunction
    with CVE-2016-10743.

CVE-2020-12695

    The Open Connectivity Foundation UPnP specification before
    2020-04-17 does not forbid the acceptance of a subscription
    request with a delivery URL on a different network segment
    than the fully qualified event-subscription URL, aka the
    CallStranger issue.

For Debian 9 stretch, these problems have been fixed in version
2:2.4-1+deb9u7.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpa

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=eSMy
-----END PGP SIGNATURE-----


Reply to: