Bugs fixes in "wpa"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
CVE | CVE-2019-9499 | EAP-pwd peer missing commit validation for scalar/element | 2019-04-11 |
CVE | CVE-2019-9498 | EAP-pwd server missing commit validation for scalar/element | 2019-04-11 |
CVE | CVE-2019-9497 | EAP-pwd server not checking for reflection attack | 2019-04-11 |
CVE | CVE-2019-9495 | cache attack against EAP-pwd | 2019-04-11 |
CVE | CVE-2016-10743 | hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call. | 2019-04-10 |
CVE | CVE-2019-9499 | EAP-pwd peer missing commit validation for scalar/element | 2019-04-10 |
CVE | CVE-2019-9498 | EAP-pwd server missing commit validation for scalar/element | 2019-04-10 |
CVE | CVE-2019-9497 | EAP-pwd server not checking for reflection attack | 2019-04-10 |
CVE | CVE-2019-9495 | cache attack against EAP-pwd | 2019-04-10 |
CVE | CVE-2016-10743 | hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call. | 2019-04-10 |
CVE | CVE-2019-9499 | EAP-pwd peer missing commit validation for scalar/element | 2019-04-10 |
CVE | CVE-2019-9498 | EAP-pwd server missing commit validation for scalar/element | 2019-04-10 |
CVE | CVE-2019-9497 | EAP-pwd server not checking for reflection attack | 2019-04-10 |
CVE | CVE-2019-9495 | cache attack against EAP-pwd | 2019-04-10 |
CVE | CVE-2019-9499 | EAP-pwd peer missing commit validation for scalar/element | 2019-04-10 |
CVE | CVE-2019-9498 | EAP-pwd server missing commit validation for scalar/element | 2019-04-10 |
CVE | CVE-2019-9497 | EAP-pwd server not checking for reflection attack | 2019-04-10 |
CVE | CVE-2019-9495 | cache attack against EAP-pwd | 2019-04-10 |
CVE | CVE-2019-9499 | EAP-pwd peer missing commit validation for scalar/element | 2019-04-10 |
About
-
Send Feedback to @ubuntu_updates