Bug 52100 - (ES 4.3) wpa
(ES 4.3) wpa
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All other
: P5 normal (vote)
: ---
Assigned To: Quality Assurance
Felix Botner
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-09-20 21:53 CEST by Erik Damrose
Modified: 2020-11-30 18:19 CET (History)
1 user (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Erik Damrose univentionstaff 2020-09-20 21:53:55 CEST
Provide wpa version 2:2.4-1+deb9u7A~4.4.5.202008100901 for UCS 4.3
First imported at bug #51794

This update addresses the following issues:
* Not preventig the use of low quality PRNG in EAP mode leads to insufficient
  entropy (CVE-2019-10064)
* UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
Comment 1 Felix Botner univentionstaff 2020-11-19 13:54:22 CET
-> apt-cache policy wpasupplicant
wpasupplicant:
  Installiert:           2:2.4-1+deb9u7A~4.4.5.202008100901
  Installationskandidat: 2:2.4-1+deb9u7A~4.4.5.202008100901
  Versionstabelle:
 *** 2:2.4-1+deb9u7A~4.4.5.202008100901 500
        500 http://192.168.0.10/build2 ucs_4.3-0-extsec4.3/amd64/ Packages
Comment 2 Erik Damrose univentionstaff 2020-11-30 18:19:07 CET
CLOSED: Released as extsec4.3 update