Bug 51698 - wpa: Multiple issues (4.4)
wpa: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-5-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-07-22 14:29 CEST by Quality Assurance
Modified: 2020-07-29 16:50 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 6.5 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-07-22 14:29:38 CEST
New Debian wpa 2:2.4-1+deb9u6A~4.4.5.202007221413 fixes:
This update addresses the following issue:
* AP mode PMF disconnection protection bypass (CVE-2019-16275)
Comment 1 Quality Assurance univentionstaff 2020-07-23 13:16:25 CEST
--- mirror/ftp/4.4/unmaintained/4.4-1/source/wpa_2.4-1+deb9u4A~4.4.0.201905251053.dsc
+++ apt/ucs_4.4-0-errata4.4-5/source/wpa_2.4-1+deb9u6A~4.4.5.202007221413.dsc
@@ -1,7 +1,22 @@
-2:2.4-1+deb9u4A~4.4.0.201905251053 [Sat, 25 May 2019 10:53:37 +0200] Univention builddaemon <buildd@univention.de>:
+2:2.4-1+deb9u6A~4.4.5.202007221413 [Wed, 22 Jul 2020 14:29:49 +0200] Univention builddaemon <buildd@univention.de>:
 
   * UCS auto build. The following patches have been applied to the original source package
     eapol_test
+
+2:2.4-1+deb9u6 [Tue, 07 Jul 2020 11:52:38 +0200] Andrej Shadura <andrewsh@debian.org>:
+
+  * Refresh the patch for CVE-2019-16275 to include the missing inline
+    function.
+  * Add an upstream patch to fix the MAC randomisation issue with some
+    cards (LP: #1867908, Closes: #954457)
+
+2:2.4-1+deb9u5 [Mon, 13 Jan 2020 11:06:28 +0100] Andrej Shadura <andrewsh@debian.org>:
+
+  * SECURITY UPDATE:
+    - AP mode PMF disconnection protection bypass.
+      More details:
+       + https://w1.fi/security/2019-7/
+      Closes: #940080 (CVE-2019-16275)
 
 2:2.4-1+deb9u4 [Fri, 26 Apr 2019 15:21:54 +0200] Andrej Shadura <andrewsh@debian.org>:
 

<http://10.200.17.11/4.4-5/#5816745113250804498>
Comment 2 Philipp Hahn univentionstaff 2020-07-23 16:38:50 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-5] 463d029a40 Bug #51698: wpa 2:2.4-1+deb9u6A~4.4.5.202007221413
 doc/errata/staging/wpa.yaml | 12 ++++++++++++
 1 file changed, 12 insertions(+)