Package "wpa"

Name: wpa


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • client support for WPA and WPA2 (IEEE 802.11i)

Latest version: 2:2.9-1ubuntu4.3
Release: focal (20.04)
Level: updates
Repository: main


Other versions of "wpa" in Focal

Repository Area Version
base main 2:2.9-1ubuntu4
security main 2:2.9-1ubuntu4.3
security universe 2:2.9-1ubuntu4.3
updates universe 2:2.9-1ubuntu4.3

Packages in group

Deleted packages are displayed in grey.


Version: 2:2.9-1ubuntu4.3 2021-03-03 15:07:16 UTC

  wpa (2:2.9-1ubuntu4.3) focal-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution via P2P provision
    discovery requests
    - debian/patches/CVE-2021-27803.patch: fix a corner case in peer
      addition based on PD Request in src/p2p/p2p_pd.c.
    - CVE-2021-27803

 -- Marc Deslauriers <email address hidden> Mon, 01 Mar 2021 08:44:39 -0500

Source diff to previous version
CVE-2021-27803 A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could

Version: 2:2.9-1ubuntu4.2 2021-02-11 22:06:53 UTC

  wpa (2:2.9-1ubuntu4.2) focal-security; urgency=medium

  * SECURITY UPDATE: P2P discovery heap overflow
    - debian/patches/CVE-2021-0326.patch: P2P: Fix copying of secondary
      device types for P2P group client
    - CVE-2021-0326
    - debian/patches/CVE-2020-12695-1.patch: WPS UPnP: Do not allow
      event subscriptions with URLs to other networks
    - debian/patches/CVE-2020-12695-2.patch: WPS UPnP: Fix event message
      generation using a long URL path
    - debian/patches/CVE-2020-12695-3.patch: WPS UPnP: Handle HTTP
      initiation failures for events more properly
    - CVE-2020-12695

 -- Steve Beattie <email address hidden> Tue, 09 Feb 2021 22:29:47 -0800

Source diff to previous version
CVE-2021-0326 In p2p_copy_client_info of p2p.c, there is a possible out of bounds wr ...
CVE-2020-12695 The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on

Version: 2:2.9-1ubuntu4.1 2020-07-02 13:06:39 UTC

  wpa (2:2.9-1ubuntu4.1) focal; urgency=medium

  * debian/patches/git_roaming_interface.patch:
    - backport upstream fix 'dbus: Move roam metrics to the correct
      interface', should reduces the number of events (lp: #1879087)
  * debian/NetworkManager/no-mac-addr-change.conf:
    - remove configuration options that aren't needed and were copied to
      the wrong section, fixes warnings in the log (lp: #1826639)
  * debian/patches/Check-for-FT-support-when-selecting-FT-suites.patch:
    - Backport upstream fix "Check for FT support when selecting FT suites"
      to fix drivers without FT support, thanks Kai-Heng Feng (lp: #1881549)

 -- Sebastien Bacher <email address hidden> Wed, 20 May 2020 13:01:53 +0200

1879087 dbus errors, frequent roaming and unstable connectivity
1826639 wpasupplicant: unknown keys in no-mac-addr-change.conf
1881549 BCM43602 [14e4:43ba] Subsystem [1028:0020]: Upgraded to 20.04 and wifi broke

About   -   Send Feedback to @ubuntu_updates