Debian: DSA-4450-1: wpa security update

    Date24 May 2019
    CategoryDebian
    5476
    Posted ByLinuxSecurity Advisories
    A vulnerability was found in the WPA protocol implementation found in wpa_supplication (station) and hostapd (access point). The EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4450-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                        Yves-Alexis Perez
    May 24, 2019                          https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : wpa
    CVE ID         : CVE-2019-11555
    Debian Bug     : 927463
    
    A vulnerability was found in the WPA protocol implementation found in
    wpa_supplication (station) and hostapd (access point).
    
    The EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP
    peer) doesn't properly validate fragmentation reassembly state when receiving
    an unexpected fragment. This could lead to a process crash due to a NULL
    pointer derefrence.
    
    An attacker in radio range of a station or access point with EAP-pwd support
    could cause a crash of the relevant process (wpa_supplicant or hostapd),
    ensuring a denial of service.
    
    For the stable distribution (stretch), this problem has been fixed in
    version 2:2.4-1+deb9u4.
    
    We recommend that you upgrade your wpa packages.
    
    For the detailed security status of wpa please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/wpa
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"5","type":"x","order":"2","pct":83.33,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.