Univention Bugzilla – Full Text Bug Listing |
Summary: | wpa: Multiple issues (4.4) | ||
---|---|---|---|
Product: | UCS | Reporter: | Philipp Hahn <hahn> |
Component: | Security updates | Assignee: | Quality Assurance <qa> |
Status: | CLOSED FIXED | QA Contact: | Philipp Hahn <hahn> |
Severity: | normal | ||
Priority: | P3 | CC: | damrose |
Version: | UCS 4.4 | ||
Target Milestone: | UCS 4.4-0-errata | ||
Hardware: | All | ||
OS: | Linux | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) |
Description
Philipp Hahn
2019-04-23 12:25:09 CEST
--- mirror/ftp/4.3/unmaintained/4.3-3/source/wpa_2.4-1+deb9u2A~4.3.2.201811191242.dsc +++ apt/ucs_4.4-0-errata4.4-0/source/wpa_2.4-1+deb9u3A~4.4.0.201904231223.dsc @@ -1,7 +1,23 @@ -2:2.4-1+deb9u2A~4.3.2.201811191242 [Mon, 19 Nov 2018 12:42:29 +0100] Univention builddaemon <buildd@univention.de>: +2:2.4-1+deb9u3A~4.4.0.201904231223 [Tue, 23 Apr 2019 12:23:52 +0200] Univention builddaemon <buildd@univention.de>: * UCS auto build. The following patches have been applied to the original source package eapol_test + +2:2.4-1+deb9u3 [Wed, 10 Apr 2019 18:57:51 +0200] Andrej Shadura <andrewsh@debian.org>: + + * Apply a partial security fix for CVE-2019-9495: + - OpenSSL: Use constant time operations for private bignums. + - See https://w1.fi/security/2019-2/ for more details. + * Apply security fixes: + - EAP-pwd server: Detect reflection attacks (CVE-2019-9497) + - EAP-pwd client: Verify received scalar and element + (partial fix for CVE-2019-9498) + - EAP-pwd server: Verify received scalar and element + (partial fix for CVE-2019-9499) + - See https://w1.fi/security/2019-4/ for more details. + * Add an upstream patch to add crypto_ec_point_cmp() required + by the fixes for CVE-2019-9497. + * Forcefully enable compilation of the ECC code. 2:2.4-1+deb9u2 [Thu, 09 Aug 2018 09:23:49 +0200] Andrej Shadura <andrewsh@debian.org>: <http://10.200.17.11/4.4-0/#737853719331316055> OK: yaml OK: announce_errata OK: patch OK: piuparts [4.4-0] 03a54527b2 Bug #49334: wpa 2:2.4-1+deb9u3A~4.4.0.201904231223 doc/errata/staging/wpa.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) |