[Git][security-tracker-team/security-tracker][master] 4 commits: CVE-2022-23304,wpa: Mark as ignored for Stretch
Markus Koschany (@apo)
apo at debian.org
Wed Feb 2 15:19:35 GMT 2022
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
9c252aac by Markus Koschany at 2022-02-02T16:03:12+01:00
CVE-2022-23304,wpa: Mark as ignored for Stretch
An attacker requires root access to install an application for side-channel
attacks.
The fix for CVE-2022-23304 adds further improvements to the changes which are needed to
address CVE-2019-9495 (patches are available from
https://w1.fi/security/2019-2/).
Only the 0001-OpenSSL-Use-constant-time-operations-for-private-big.patch has been
applied in Debian back then. The version of wpa in Stretch lacks further prerequisites
like the crypto_bignum_legendre and crypto_ec_point_solve_y_coord function and
commit https://w1.fi/cgit/hostap/commit/src?id=22ac3dfebf7b
EAP-pwd: Mask timing of PWE derivation which are all needed to harden against the possible EAP
side-channel attacks. Since it is already unlikely to crack the password and
root access is required to exploit the problem I am going to mark this CVE as ignored.
- - - - -
3431b67b by Markus Koschany at 2022-02-02T16:17:45+01:00
Remove wpa from dla-needed.txt
- - - - -
611cb0fb by Markus Koschany at 2022-02-02T16:18:13+01:00
Remove minetest from dla-needed.txt.
I have contacted utkarsh (frontdesk).
- - - - -
27b20f74 by Markus Koschany at 2022-02-02T16:18:57+01:00
Claim vim in dla-needed.txt
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -3648,6 +3648,7 @@ CVE-2022-0246
RESERVED
CVE-2022-23304 (The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplica ...)
- wpa 2:2.10-1
+ [stretch] - wpa <ignored> (Minor issue)
NOTE: https://w1.fi/security/2022-1/
NOTE: Issue exists because of an incomplete fix for CVE-2019-9495
CVE-2022-23303 (The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...)
=====================================
data/dla-needed.txt
=====================================
@@ -64,11 +64,6 @@ linux (Ben Hutchings)
--
linux-4.19 (Ben Hutchings)
--
-minetest
- NOTE: 20220130: double check for impact. (utkarsh)
- NOTE: 20220131: Games are not supported in LTS but I try to fix this problem
- NOTE: 20220131: in stable (apo)
---
openjdk-8 (Emilio)
--
pgbouncer
@@ -97,10 +92,7 @@ varnish
NOTE: 20220130: also fix no-dsa issues. (utkarsh)
NOTE: 20220130: VRB_Ignore function is very different from what's in the patch. (utkarsh)
--
-vim
---
-wpa (Markus Koschany)
- NOTE: 20220124: CVE-2018-9495 has been applied
+vim (Markus Koschany)
--
zabbix (Sylvain Beucler)
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/0c2704be1ce1c7e7b24dcbc4087feae9d6a931d1...27b20f74a1ddd38a3088ec49ef6b175e13d754bc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/0c2704be1ce1c7e7b24dcbc4087feae9d6a931d1...27b20f74a1ddd38a3088ec49ef6b175e13d754bc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220202/ef711640/attachment.htm>
More information about the debian-security-tracker-commits
mailing list