|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for wpa (DLA-2318-1)|
|Summary:||The remote host is missing an update for the 'wpa'; package(s) announced via the DLA-2318-1 advisory.|
The remote host is missing an update for the 'wpa'
package(s) announced via the DLA-2318-1 advisory.
The following CVE(s) have been reported against src:wpa.
hostapd before 2.6, in EAP mode, makes calls to the rand()
and random() standard library functions without any preceding
srand() or srandom() call, which results in inappropriate
use of deterministic values. This was fixed in conjunction
The Open Connectivity Foundation UPnP specification before
2020-04-17 does not forbid the acceptance of a subscription
request with a delivery URL on a different network segment
than the fully qualified event-subscription URL, aka the
'wpa' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your wpa packages.
Common Vulnerability Exposure (CVE) ID: CVE-2016-10743|
Common Vulnerability Exposure (CVE) ID: CVE-2019-10064
Common Vulnerability Exposure (CVE) ID: CVE-2020-12695
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.