Univention Bugzilla – Bug 51698
wpa: Multiple issues (4.4)
Last modified: 2020-07-29 16:50:33 CEST
New Debian wpa 2:2.4-1+deb9u6A~4.4.5.202007221413 fixes: This update addresses the following issue: * AP mode PMF disconnection protection bypass (CVE-2019-16275)
--- mirror/ftp/4.4/unmaintained/4.4-1/source/wpa_2.4-1+deb9u4A~4.4.0.201905251053.dsc +++ apt/ucs_4.4-0-errata4.4-5/source/wpa_2.4-1+deb9u6A~4.4.5.202007221413.dsc @@ -1,7 +1,22 @@ -2:2.4-1+deb9u4A~4.4.0.201905251053 [Sat, 25 May 2019 10:53:37 +0200] Univention builddaemon <buildd@univention.de>: +2:2.4-1+deb9u6A~4.4.5.202007221413 [Wed, 22 Jul 2020 14:29:49 +0200] Univention builddaemon <buildd@univention.de>: * UCS auto build. The following patches have been applied to the original source package eapol_test + +2:2.4-1+deb9u6 [Tue, 07 Jul 2020 11:52:38 +0200] Andrej Shadura <andrewsh@debian.org>: + + * Refresh the patch for CVE-2019-16275 to include the missing inline + function. + * Add an upstream patch to fix the MAC randomisation issue with some + cards (LP: #1867908, Closes: #954457) + +2:2.4-1+deb9u5 [Mon, 13 Jan 2020 11:06:28 +0100] Andrej Shadura <andrewsh@debian.org>: + + * SECURITY UPDATE: + - AP mode PMF disconnection protection bypass. + More details: + + https://w1.fi/security/2019-7/ + Closes: #940080 (CVE-2019-16275) 2:2.4-1+deb9u4 [Fri, 26 Apr 2019 15:21:54 +0200] Andrej Shadura <andrewsh@debian.org>: <http://10.200.17.11/4.4-5/#5816745113250804498>
OK: yaml OK: announce_errata OK: patch OK: piuparts [4.4-5] 463d029a40 Bug #51698: wpa 2:2.4-1+deb9u6A~4.4.5.202007221413 doc/errata/staging/wpa.yaml | 12 ++++++++++++ 1 file changed, 12 insertions(+)
<https://errata.software-univention.de/#/?erratum=4.4x679>