aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorUtkarsh Gupta <utkarsh@debian.org>2020-08-09 02:28:36 +0530
committerUtkarsh Gupta <utkarsh@debian.org>2020-08-09 02:28:36 +0530
commit7cdd275781d3e7d1cada57d742b9f7cebdf7a845 (patch)
tree0051e446acfcaf176b3783ec333054e7aa090ba0
parent5450f28d513c4b1c1be7f25d60581d6b8d2d3517 (diff)
DLA-2318-1 advisory
-rw-r--r--english/lts/security/2020/dla-2318.data10
-rw-r--r--english/lts/security/2020/dla-2318.wml41
2 files changed, 51 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2318.data b/english/lts/security/2020/dla-2318.data
new file mode 100644
index 00000000000..b9de76df0b3
--- /dev/null
+++ b/english/lts/security/2020/dla-2318.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-2318-1 wpa</define-tag>
+<define-tag report_date>2020-08-09</define-tag>
+<define-tag secrefs>CVE-2019-10064 CVE-2020-12695</define-tag>
+<define-tag packages>wpa</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2020/dla-2318.wml b/english/lts/security/2020/dla-2318.wml
new file mode 100644
index 00000000000..40257a75770
--- /dev/null
+++ b/english/lts/security/2020/dla-2318.wml
@@ -0,0 +1,41 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+<p>The following CVE(s) have been reported against src:wpa.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10064">CVE-2019-10064</a>
+
+ <p>hostapd before 2.6, in EAP mode, makes calls to the rand()
+ and random() standard library functions without any preceding
+ srand() or srandom() call, which results in inappropriate
+ use of deterministic values. This was fixed in conjunction
+ with <a href="https://security-tracker.debian.org/tracker/CVE-2016-10743">CVE-2016-10743</a>.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12695">CVE-2020-12695</a>
+
+ <p>The Open Connectivity Foundation UPnP specification before
+ 2020-04-17 does not forbid the acceptance of a subscription
+ request with a delivery URL on a different network segment
+ than the fully qualified event-subscription URL, aka the
+ CallStranger issue.</p></li>
+
+</ul>
+
+<p>For Debian 9 stretch, these problems have been fixed in version
+2:2.4-1+deb9u7.</p>
+
+<p>We recommend that you upgrade your wpa packages.</p>
+
+<p>For the detailed security status of wpa please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/wpa">https://security-tracker.debian.org/tracker/wpa</a></p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2020/dla-2318.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy