Bugs fixes in "wpa"
| Origin | Bug number | Title | Date fixed |
|---|---|---|---|
| Launchpad | 1826639 | wpasupplicant: unknown keys in no-mac-addr-change.conf | 2020-06-16 |
| Launchpad | 1879087 | dbus errors, frequent roaming and unstable connectivity | 2020-06-16 |
| Launchpad | 1881549 | BCM43602 [14e4:43ba] Subsystem [1028:0020]: Upgraded to 20.04 and wifi broke | 2020-06-16 |
| Launchpad | 1826639 | wpasupplicant: unknown keys in no-mac-addr-change.conf | 2020-06-16 |
| Launchpad | 1879087 | dbus errors, frequent roaming and unstable connectivity | 2020-06-16 |
| CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-20 |
| CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
| CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
| CVE | CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida | 2019-09-18 |
| CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
| CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
| CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
| CVE | CVE-2019-13377 | Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves | 2019-08-14 |
| CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-08 |
| CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
| CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
| CVE | CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta | 2019-05-07 |
| CVE | CVE-2019-9499 | EAP-pwd peer missing commit validation for scalar/element | 2019-04-11 |
| CVE | CVE-2019-9498 | EAP-pwd server missing commit validation for scalar/element | 2019-04-11 |
| CVE | CVE-2019-9497 | EAP-pwd server not checking for reflection attack | 2019-04-11 |
About
-
Send Feedback to @ubuntu_updates