-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2581-1 [email protected] https://www.debian.org/lts/security/ Utkarsh Gupta March 03, 2021 https://wiki.debian.org/LTS - -----------------------------------------------------------------------
Package : wpa Version : 2:2.4-1+deb9u9 CVE ID : CVE-2021-27803 A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. For Debian 9 stretch, this problem has been fixed in version 2:2.4-1+deb9u9. We recommend that you upgrade your wpa packages. For the detailed security status of wpa please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpa Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmA+q2EACgkQgj6WdgbD S5YmGBAAwNGAFyVTyMwsv+PSBJebtvWjbKBxbssz7J21s9vZnYRLgtlYDXbm17rE SPAKZd4kDDU/s4GFuKNl1+hq+W9oo+Qrrn1JjKG3k9VGPsLcngGZB4hkXJM9CIky i5sb+vi49E7FshX+KEcB0W+NNL16i1PcdMtsndg3nS8vlBsWbUNAztjW+XQvNSzV B3ymCeFJlTFpqr75hRai5aw2IwPMvlmAeVEBB/skuzS3zjkLTUsFA4RW5Up4Jgeg e+RzhHB4AcXIDWfNEPoEMqe/PscVolwD44s0OHtic5HzLDWGPtsHSfC/KDpTKgiY 7br11dKehjHpfX3WblrVSqjMzqOA7U2BZz8GGpmM+UfKOqHljFE6QFDwfaNnE93a oCm28LMkip6k93Z1EHDTgSH79dQhocQhD/ZIGnDxaZW3rMjrPKU6VmXQa8c4nmOx Z2PdlFOx1ZTh9NdQicfHK9eOjq704IclBf34qd+0EuBimEz3r5CE3cXOlSYs/Q9O z2Gk72HxjR3jV/cDWCtPPpwLh/TNig8ejyWZ50abl4b+GOiiCplmG+arI+Ih5FBr 8nJhS9psVYFVkaEtNa+70jgkE9G2OAl5lywVL9JO1/H0RsDimV0oPkEHgel2pCqg f61lc2HGibS7XlDRGaKGnmxuuudYpmk029kZ5R9OzrIwrGIkrZc= =9LXU -----END PGP SIGNATURE-----
