UbuntuUpdates.org

Package "hostapd"

Name: hostapd

Description:

IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator

Latest version: 2:2.6-15ubuntu2.8+esm1
Release: bionic (18.04)
Level: security
Repository: universe
Head package: wpa
Homepage: http://w1.fi/wpa_supplicant/

Links


Download "hostapd"


Other versions of "hostapd" in Bionic

Repository Area Version
base universe 2:2.6-15ubuntu2
updates universe 2:2.6-15ubuntu2.8+esm1

Changelog

Version: 2:2.6-15ubuntu2.8+esm1 2024-08-06 19:07:11 UTC

  wpa (2:2.6-15ubuntu2.8+esm1) bionic-security; urgency=medium

  * SECURITY UPDATE: loading arbitrary shared objects, privilege escalation
    - debian/patches/lib_engine_trusted_path.patch: Allow shared objects
      to only be loaded from /usr/lib, thanks to mdeslaur
    - CVE-2024-5290

 -- Sudhakar Verma <email address hidden> Mon, 05 Aug 2024 19:58:52 +0530

Source diff to previous version

Version: 2:2.6-15ubuntu2.8 2021-03-03 13:06:26 UTC

  wpa (2:2.6-15ubuntu2.8) bionic-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution via P2P provision
    discovery requests
    - debian/patches/CVE-2021-27803.patch: fix a corner case in peer
      addition based on PD Request in src/p2p/p2p_pd.c.
    - CVE-2021-27803

 -- Marc Deslauriers <email address hidden> Mon, 01 Mar 2021 08:45:44 -0500

Source diff to previous version
CVE-2021-27803 A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could

Version: 2:2.6-15ubuntu2.7 2021-02-11 22:06:50 UTC

  wpa (2:2.6-15ubuntu2.7) bionic-security; urgency=medium

  * SECURITY UPDATE: P2P discovery heap overflow
    - debian/patches/CVE-2021-0326.patch: P2P: Fix copying of secondary
      device types for P2P group client
    - CVE-2021-0326
  * SECURITY UPDATE: UPnP SUBSCRIBE misbehavior in WPS AP
    - debian/patches/CVE-2020-12695-1.patch: WPS UPnP: Do not allow
      event subscriptions with URLs to other networks
    - debian/patches/CVE-2020-12695-2.patch: WPS UPnP: Fix event message
      generation using a long URL path
    - debian/patches/CVE-2020-12695-3.patch: WPS UPnP: Handle HTTP
      initiation failures for events more properly
    - CVE-2020-12695

 -- Steve Beattie <email address hidden> Tue, 09 Feb 2021 22:30:21 -0800

Source diff to previous version
CVE-2021-0326 In p2p_copy_client_info of p2p.c, there is a possible out of bounds wr ...
CVE-2020-12695 The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on

Version: 2:2.6-15ubuntu2.5 2019-09-18 14:06:38 UTC

  wpa (2:2.6-15ubuntu2.5) bionic-security; urgency=medium

   * SECURITY UPDATE: Incorrect indication of disconnection in certain
     situations
     - debian/patches/CVE-2019-16275.patch: silently ignore management
       frame from unexpected source address in src/ap/drv_callbacks.c,
       src/ap/ieee882_11.c.
     - CVE-2019-16275

 -- <email address hidden> (Leonidas S. Barbosa) Tue, 17 Sep 2019 08:45:06 -0300

Source diff to previous version
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida

Version: 2:2.6-15ubuntu2.4 2019-08-14 14:11:32 UTC

  wpa (2:2.6-15ubuntu2.4) bionic-security; urgency=medium

  * SECURITY UPDATE: SAE/EAP-pwd side-channel attack w/Brainpool curves
    - debian/patches/CVE-2019-13377-2.patch: use const_time_memcmp() for
      pwd_value >= prime comparison in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-3.patch: use BN_bn2binpad() or
      BN_bn2bin_padded() if available in src/crypto/crypto_openssl.c.
    - debian/patches/CVE-2019-13377-5.patch: run through prf result
      processing even if it >= prime in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-pre6.patch: disallow ECC groups with a
      prime under 256 bits in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-6.patch: disable use of groups using
      Brainpool curves in src/eap_common/eap_pwd_common.c.
    - CVE-2019-13377

 -- Marc Deslauriers <email address hidden> Tue, 13 Aug 2019 14:07:43 -0400

CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves



About   -   Send Feedback to @ubuntu_updates