UbuntuUpdates.org

Bugs fixes in "wpa"

Origin Bug number Title Date fixed
Launchpad 1879087 dbus errors, frequent roaming and unstable connectivity 2020-06-16
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-20
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-20
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-18
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-18
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-18
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-18
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-18
CVE CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida 2019-09-18
CVE CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves 2019-08-14
CVE CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves 2019-08-14
CVE CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves 2019-08-14
CVE CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves 2019-08-14
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-08
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-07
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-07
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-07
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-07
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-07
CVE CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta 2019-05-07



About   -   Send Feedback to @ubuntu_updates