UbuntuUpdates.org

Package "wpa"

Name: wpa

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • client support for WPA and WPA2 (IEEE 802.11i)

Latest version: 2:2.6-21ubuntu3.2
Release: disco (19.04)
Level: updates
Repository: main

Links

Save this URL for the latest version of "wpa": https://www.ubuntuupdates.org/wpa



Other versions of "wpa" in Disco

Repository Area Version
base main 2:2.6-21ubuntu3
base universe 2:2.6-21ubuntu3
security universe 2:2.6-21ubuntu3.2
security main 2:2.6-21ubuntu3.2
updates universe 2:2.6-21ubuntu3.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:2.6-21ubuntu3.2 2019-08-14 15:08:47 UTC

  wpa (2:2.6-21ubuntu3.2) disco-security; urgency=medium

  * SECURITY UPDATE: SAE/EAP-pwd side-channel attack w/Brainpool curves
    - debian/patches/CVE-2019-13377-2.patch: use const_time_memcmp() for
      pwd_value >= prime comparison in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-3.patch: use BN_bn2binpad() or
      BN_bn2bin_padded() if available in src/crypto/crypto_openssl.c.
    - debian/patches/CVE-2019-13377-5.patch: run through prf result
      processing even if it >= prime in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-pre6.patch: disallow ECC groups with a
      prime under 256 bits in src/eap_common/eap_pwd_common.c.
    - debian/patches/CVE-2019-13377-6.patch: disable use of groups using
      Brainpool curves in src/eap_common/eap_pwd_common.c.
    - CVE-2019-13377

 -- Marc Deslauriers <email address hidden> Tue, 13 Aug 2019 13:59:04 -0400

Source diff to previous version
CVE-2019-13377 Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves

Version: 2:2.6-21ubuntu3.1 2019-05-07 16:07:17 UTC

  wpa (2:2.6-21ubuntu3.1) disco-security; urgency=medium

  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

 -- Marc Deslauriers <email address hidden> Wed, 01 May 2019 09:57:53 -0400

CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta



About   -   Send Feedback to @ubuntu_updates