• [SECURITY] [DSA 4898-1] wpa security update

    From Salvatore Bonaccorso@21:1/5 to All on Thu Apr 22 21:00:01 2021
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-4898-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso
    April 22, 2021 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : wpa
    CVE ID : CVE-2020-12695 CVE-2021-0326 CVE-2021-27803
    Debian Bug : 976106 981971

    Several vulnerabilities have been discovered in wpa_supplicant and
    hostapd.

    CVE-2020-12695

    It was discovered that hostapd does not properly handle UPnP
    subscribe messages under certain conditions, allowing an attacker to
    cause a denial of service.

    CVE-2021-0326

    It was discovered that wpa_supplicant does not properly process P2P
    (Wi-Fi Direct) group information from active group owners. An
    attacker within radio range of the device running P2P could take
    advantage of this flaw to cause a denial of service or potentially
    execute arbitrary code.

    CVE-2021-27803

    It was discovered that wpa_supplicant does not properly process
    P2P (Wi-Fi Direct) provision discovery requests. An attacker
    within radio range of the device running P2P could take advantage
    of this flaw to cause a denial of service or potentially execute
    arbitrary code.

    For the stable distribution (buster), these problems have been fixed in
    version 2:2.7+git20190128+0c1e29f-6+deb10u3.

    We recommend that you upgrade your wpa packages.

    For the detailed security status of wpa please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/wpa

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmCBxcZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QRbw//chJxW9vhszfe/MrHkuEBC/y0jzkQ0GxJG/DT+EXvHnq8KyVht92B81sU Ia860UeNygOY1vAe8izNVpxPEi1PpI7Y6VfvqcWC5dMFNEmOk8yMzJXPDYtwrO3b q7Fq6MJys6HTooIInCVjdwVTmvVfocEiOl2Oy+smBE8ylkUPIShJj+UsnBR3qMCB 9IoxgeFsHl4HpRzsC1uiTMmNPUqqychqzyn26aA+Vp5nfPkvpsSc6aA68BBUm529 5udANpQneYrsQ+EKMm2wQmw9xNWbrqzRUCmi/XGxJ5YEibOjMLZeBMWq35MRQKDS BaaEPbjPMbBP7p6yp795pdt/XgNL1cJPejEBBQWPs3PrRuW/inhjJbSvenPl5AIB wOV8OzoxDw0m5DdYr2IuYRNu3zt743e/v5oDhDOiSteBl7zjs4cUohfOryaH/htN 7Ok3BbhfVc7xfW/XhXNq2axXPGDdSOI3Y6ZXPgiTlX3eIm8Culg7Rm52JprbAc0a aP0pkGjHO3MAIsvRU/H7WGJbhCdS0i/XTAbuJming5zzCpigGaQG9wOawYH4lNJV BNEX/DjjcsZ4oETxWn0sG/LVIl3m2TCry2cayZsy8806nTqlhFS2py5tx6gn5NBi e5JGaYRgwa6TUxj4UjWnbdIKMpElbtXbMIOHSvG2Gnx/21siyg0=
    =CU/j
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)