Discover Government News


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3743-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
February 27, 2024                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : wpa
Version        : 2:2.7+git20190128+0c1e29f-6+deb10u4
CVE ID         : CVE-2023-52160
Debian Bug     : 1064061

It was discovered that there was a potential authentication bypass
vulnerability in wpa, a set of tools including the widely-used
wpasupplicant client for authenticating with WPA and WPA2 wireless
networks.

For an attack to have been successful, wpasupplicant must have been
configured to not verify the network's TLS certificate during Phase 1
of the authentication cycle; a eap_peap_decrypt vulnerability could
have been used to skip Phase 2 authentication by sending an EAP-TLV
"Success" packet instead of starting Phase 2.

For Debian 10 buster, this problem has been fixed in version
2:2.7+git20190128+0c1e29f-6+deb10u4.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/wpa

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3743-1: wpa security update

February 27, 2024
It was discovered that there was a potential authentication bypass vulnerability in wpa, a set of tools including the widely-used wpasupplicant client for authenticating with WPA a...

Summary

For an attack to have been successful, wpasupplicant must have been
configured to not verify the network's TLS certificate during Phase 1
of the authentication cycle; a eap_peap_decrypt vulnerability could
have been used to skip Phase 2 authentication by sending an EAP-TLV
"Success" packet instead of starting Phase 2.

For Debian 10 buster, this problem has been fixed in version
2:2.7+git20190128+0c1e29f-6+deb10u4.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/wpa

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : wpa
Version : 2:2.7+git20190128+0c1e29f-6+deb10u4
CVE ID : CVE-2023-52160
Debian Bug : 1064061

Related News