Bugs fixes in "wpa"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 1879087 | dbus errors, frequent roaming and unstable connectivity | 2020-06-16 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-20 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-20 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-08 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
About
-
Send Feedback to @ubuntu_updates