Bug 49334

Summary: wpa: Multiple issues (4.4)
Product: UCS Reporter: Philipp Hahn <hahn>
Component: Security updatesAssignee: Quality Assurance <qa>
Status: CLOSED FIXED QA Contact: Philipp Hahn <hahn>
Severity: normal    
Priority: P3 CC: damrose
Version: UCS 4.4   
Target Milestone: UCS 4.4-0-errata   
Hardware: All   
OS: Linux   
What kind of report is it?: Security Issue What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score: 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

Description Philipp Hahn univentionstaff 2019-04-23 12:25:09 CEST
New Debian wpa 2:2.4-1+deb9u3A~4.4.0.201904231223 fixes:
This update addresses the following issues:
* EAP-pwd cache side-channel attack (CVE-2019-9495)
* EAP-pwd server not checking for reflection attack (CVE-2019-9497)
* EAP-pwd server missing commit validation for scalar/element (CVE-2019-9498)
* EAP-pwd peer missing commit validation for scalar/element (CVE-2019-9499)
Comment 1 Quality Assurance univentionstaff 2019-04-23 12:43:32 CEST
--- mirror/ftp/4.3/unmaintained/4.3-3/source/wpa_2.4-1+deb9u2A~4.3.2.201811191242.dsc
+++ apt/ucs_4.4-0-errata4.4-0/source/wpa_2.4-1+deb9u3A~4.4.0.201904231223.dsc
@@ -1,7 +1,23 @@
-2:2.4-1+deb9u2A~4.3.2.201811191242 [Mon, 19 Nov 2018 12:42:29 +0100] Univention builddaemon <buildd@univention.de>:
+2:2.4-1+deb9u3A~4.4.0.201904231223 [Tue, 23 Apr 2019 12:23:52 +0200] Univention builddaemon <buildd@univention.de>:
 
   * UCS auto build. The following patches have been applied to the original source package
     eapol_test
+
+2:2.4-1+deb9u3 [Wed, 10 Apr 2019 18:57:51 +0200] Andrej Shadura <andrewsh@debian.org>:
+
+  * Apply a partial security fix for CVE-2019-9495:
+    - OpenSSL: Use constant time operations for private bignums.
+    - See https://w1.fi/security/2019-2/ for more details.
+  * Apply security fixes:
+    - EAP-pwd server: Detect reflection attacks (CVE-2019-9497)
+    - EAP-pwd client: Verify received scalar and element
+      (partial fix for CVE-2019-9498)
+    - EAP-pwd server: Verify received scalar and element
+      (partial fix for CVE-2019-9499)
+    - See https://w1.fi/security/2019-4/ for more details.
+  * Add an upstream patch to add crypto_ec_point_cmp() required
+    by the fixes for CVE-2019-9497.
+  * Forcefully enable compilation of the ECC code.
 
 2:2.4-1+deb9u2 [Thu, 09 Aug 2018 09:23:49 +0200] Andrej Shadura <andrewsh@debian.org>:
 

<http://10.200.17.11/4.4-0/#737853719331316055>
Comment 2 Philipp Hahn univentionstaff 2019-04-23 12:54:41 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-0] 03a54527b2 Bug #49334: wpa 2:2.4-1+deb9u3A~4.4.0.201904231223
 doc/errata/staging/wpa.yaml | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
Comment 3 Arvid Requate univentionstaff 2019-04-24 13:13:07 CEST
<http://errata.software-univention.de/ucs/4.4/57.html>