-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3738-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb February 22, 2024 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : iwd Version : 0.14-2+deb10u1 CVE ID : CVE-2023-52161 Debian Bug : 1064062 It was discovered that there was an authentication bypass issue in iwd, the Intel Wireless Daemon. Adversaries could have gained unauthorised access to a protected 'home' (ie. non-WPA2-Enterprise) WiFi network. For Debian 10 buster, this problem has been fixed in version 0.14-2+deb10u1. We recommend that you upgrade your iwd packages. For the detailed security status of iwd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/iwd Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmXXRtgACgkQHpU+J9Qx HlgefQ//RcvCIY/hOsHEVK6HBMY2+JBYmWqsNUc7mw6xM5Gx4mCe4XBoe1Qzgzxn jQIFkyk6RyJTwIQWzjkBvdqU1ELGWT4EkFzkDQMbU7mFeorMTb4T0UV2BgbMFP0j fxzxaoATiD6Pmr6ns8kFxcDu4ktZ3ywikFs7aG2sp7WVKvMLFGPGFXbnkt+bR94F zSPvjKjGtsoiYLKn+WM/kK0huT0og1l5tnZ8IMgwEBJNb2sJHas8NK7uAPjfw525 a4iDDaW3uZjxdtQbbWWwie/aDyVXFsjP/gXdtbtKk7D+QT+wmoBOoDCeMQCIzTVG FutpiP97/Vzd2wdoA69b9w89c6vcG/XOR7SzwVLdEpg1DOTrFCNo/T3+YUKsgIOZ k5JwJ8hQznY7vHQmF9gfsZgkkJIDq1jxCvTXmvHbCDXREEtoLmYcwLcTZyEdrRM9 aSf893RFyoArSVy2wIWk/G7IWkvt666h0kxfS3pPviOPlG55aY7/97v6xSOnEmUm 4CD2sixLp34proSzLJ+9kM/bRz39a8ONfjPHAuXFzf6F1fXWDmIwAaq1Iu0R2kGZ TO+hFUBDgFHxR6l+/oZzNXA/kZsxWT8A8svnLNnmX9hsIJMAQSUsWKqVfYCV8ZtM qAU2hN9hmuSiu6M4lIH55SZruH2TcvxLLfGrRZeLHkTYRX+Khj8= =lYc5 -----END PGP SIGNATURE-----