UbuntuUpdates.org

Package "hostapd"

Name: hostapd

Description:

IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator

Latest version: 2:2.6-15ubuntu2.8+esm1
Release: bionic (18.04)
Level: updates
Repository: universe
Head package: wpa
Homepage: http://w1.fi/wpa_supplicant/

Links


Download "hostapd"


Other versions of "hostapd" in Bionic

Repository Area Version
base universe 2:2.6-15ubuntu2
security universe 2:2.6-15ubuntu2.8+esm1

Changelog

Version: 2:2.6-15ubuntu2.4 2019-08-14 15:08:46 UTC

  wpa (2:2.6-15ubuntu2.4) bionic-security; urgency=medium

  * SECURITY UPDATE: SAE/EAP-pwd side-channel attack w/Brainpool curves
    - debian/patches/CVE-2019-13377-2.patch: use const_time_memcmp() for
      pwd_value >= prime comparison in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-3.patch: use BN_bn2binpad() or
      BN_bn2bin_padded() if available in src/crypto/crypto_openssl.c.
    - debian/patches/CVE-2019-13377-5.patch: run through prf result
      processing even if it >= prime in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-pre6.patch: disallow ECC groups with a
      prime under 256 bits in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-6.patch: disable use of groups using
      Brainpool curves in src/eap_common/eap_pwd_common.c.
    - CVE-2019-13377

 -- Marc Deslauriers <email address hidden> Tue, 13 Aug 2019 14:07:43 -0400

Source diff to previous version
CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves

Version: 2:2.6-15ubuntu2.3 2019-05-07 16:07:14 UTC

  wpa (2:2.6-15ubuntu2.3) bionic-security; urgency=medium

  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

 -- Marc Deslauriers <email address hidden> Wed, 01 May 2019 09:58:51 -0400

Source diff to previous version
CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta

Version: 2:2.6-15ubuntu2.2 2019-04-10 19:07:31 UTC

  wpa (2:2.6-15ubuntu2.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499

 -- Marc Deslauriers <email address hidden> Mon, 08 Apr 2019 14:19:24 -0400

Source diff to previous version
CVE-2019-9495 cache attack against EAP-pwd
CVE-2019-9497 EAP-pwd server not checking for reflection attack
CVE-2019-9498 EAP-pwd server missing commit validation for scalar/element
CVE-2019-9499 EAP-pwd peer missing commit validation for scalar/element

Version: 2:2.6-15ubuntu2.1 2018-08-20 14:07:10 UTC

  wpa (2:2.6-15ubuntu2.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Expose sensitive information
    - debian/patches/CVE-2018-14526.patch: fix in src/rsn_supp/wpa.c.
    - CVE-2018-14526

 -- <email address hidden> (Leonidas S. Barbosa) Thu, 09 Aug 2018 11:34:33 -0300

CVE-2018-14526 An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not che



About   -   Send Feedback to @ubuntu_updates