Package "wpa"
  
    
    
        | Name: | 
        wpa
            
         | 
    
    
         Description: | 
        
             This package is just an umbrella for a group of other packages,
            it has no description. Description samples from packages in group:
             
                    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 
                    - graphical user interface for wpa_supplicant
 
             
            
         | 
    
    
        | Latest version: | 
        2:2.9-1ubuntu4.6 | 
    
    
        | Release: | 
        focal (20.04) | 
    
    
        | Level: | 
        updates | 
    
    
        | Repository: | 
        universe | 
    
    
   
  
  
 
Links
Other versions of "wpa" in Focal
    
Packages in group
Deleted packages are displayed in grey.
Changelog
    
    
    
        
        
    
    
        | 
               wpa (2:2.9-1ubuntu4.6) focal-security; urgency=medium 
  * SECURITY UPDATE: Side-channel attack due to cache access patterns.
     - debian/patches/CVE-2022-2330x-x.patch: Add crypto function operators in
       ./src/crypto/crypto.h, .../crypto_openssl.c, and  .../crypto_wolfssl.c.
       Add dragonfly_sqrt() helper function in ./src/common/dragonfly.c. Change
       coordinate calculations in ./src/eap_common/eap_pwd_common.c.
     - CVE-2022-23303
     - CVE-2022-23304
   * SECURITY UPDATE: Encrypted element reusage.
     - debian/patches/CVE-2022-37660.patch: Add hostapd_dpp_pkex_clear_code()
       and wpas_dpp_pkex_clear_code(), and clear code reusage in
       ./src/ap/dpp_hostapd.c and ./wpa_supplicant/dpp_supplicant.c
     - CVE-2022-37660 
 -- Hlib Korzhynskyy <email address hidden>  Mon, 24 Feb 2025 16:44:55 -0330 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2022-2330 | 
                Improper Restriction of XML External Entity Reference vulnerability in DLP Endpoint for Windows prior to 11.9.100 allows a remote attacker to cause t | 
                 
                
                | CVE-2022-23303 | 
                The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access p | 
                 
                
                | CVE-2022-23304 | 
                The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache acce | 
                 
                
                | CVE-2022-37660 | 
                In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               wpa (2:2.9-1ubuntu4.4) focal-security; urgency=medium 
  * SECURITY UPDATE: loading arbitrary shared objects, privilege escalation
     - debian/patches/lib_engine_trusted_path.patch: Allow shared objects
       to only be loaded from /usr/lib, thanks to mdeslaur
     - CVE-2024-5290 
 -- Sudhakar Verma <email address hidden>  Mon, 05 Aug 2024 17:49:49 +0530 
         | 
    
    | Source diff to previous version | 
    
    
    
    
    
        
        
    
    
        | 
               wpa (2:2.9-1ubuntu4.3) focal-security; urgency=medium 
  * SECURITY UPDATE: DoS and possible code execution via P2P provision
     discovery requests
     - debian/patches/CVE-2021-27803.patch: fix a corner case in peer
       addition based on PD Request in src/p2p/p2p_pd.c.
     - CVE-2021-27803 
 -- Marc Deslauriers <email address hidden>  Mon, 01 Mar 2021 08:44:39 -0500 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2021-27803 | 
                A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could  | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               wpa (2:2.9-1ubuntu4.2) focal-security; urgency=medium 
  * SECURITY UPDATE: P2P discovery heap overflow
     - debian/patches/CVE-2021-0326.patch: P2P: Fix copying of secondary
       device types for P2P group client
     - CVE-2021-0326
   * SECURITY UPDATE: UPnP SUBSCRIBE misbehavior in WPS AP
     - debian/patches/CVE-2020-12695-1.patch: WPS UPnP: Do not allow
       event subscriptions with URLs to other networks
     - debian/patches/CVE-2020-12695-2.patch: WPS UPnP: Fix event message
       generation using a long URL path
     - debian/patches/CVE-2020-12695-3.patch: WPS UPnP: Handle HTTP
       initiation failures for events more properly
     - CVE-2020-12695 
 -- Steve Beattie <email address hidden>  Tue, 09 Feb 2021 22:29:47 -0800 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2021-0326 | 
                In p2p_copy_client_info of p2p.c, there is a possible out of bounds wr ... | 
                 
                
                | CVE-2020-12695 | 
                The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               wpa (2:2.9-1ubuntu4.1) focal; urgency=medium 
  * debian/patches/git_roaming_interface.patch:
     - backport upstream fix 'dbus: Move roam metrics to the correct
       interface', should reduces the number of events (lp: #1879087)
   * debian/NetworkManager/no-mac-addr-change.conf:
     - remove configuration options that aren't needed and were copied to
       the wrong section, fixes warnings in the log (lp: #1826639)
   * debian/patches/Check-for-FT-support-when-selecting-FT-suites.patch:
     - Backport upstream fix "Check for FT support when selecting FT suites"
       to fix drivers without FT support, thanks Kai-Heng Feng (lp: #1881549) 
 -- Sebastien Bacher <email address hidden>  Wed, 20 May 2020 13:01:53 +0200 
         | 
    
    
        
        
            
            
                
                | 1879087 | 
                dbus errors, frequent roaming and unstable connectivity | 
                 
                
                | 1826639 | 
                wpasupplicant: unknown keys in no-mac-addr-change.conf | 
                 
                
                | 1881549 | 
                BCM43602 [14e4:43ba] Subsystem [1028:0020]: Upgraded to 20.04 and wifi broke | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates