Package "wpa"

Name: wpa


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • client support for WPA and WPA2 (IEEE 802.11i)

Latest version: 2.4-0ubuntu6.8
Release: xenial (16.04)
Level: security
Repository: main


Other versions of "wpa" in Xenial

Repository Area Version
base main 2.4-0ubuntu6
base universe 1:2.4-0ubuntu6
security universe 2.4-0ubuntu6.8
updates universe 2.4-0ubuntu6.8
updates main 2.4-0ubuntu6.8

Packages in group

Deleted packages are displayed in grey.


Version: 2.4-0ubuntu6.8 2021-03-03 13:06:20 UTC

  wpa (2.4-0ubuntu6.8) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution via P2P provision
    discovery requests
    - debian/patches/CVE-2021-27803-pre1.patch: cleanup handling of unknown
      peer in PD Request processing in src/p2p/p2p_pd.c.
    - debian/patches/CVE-2021-27803.patch: fix a corner case in peer
      addition based on PD Request in src/p2p/p2p_pd.c.
    - CVE-2021-27803

 -- Marc Deslauriers <email address hidden> Mon, 01 Mar 2021 09:36:31 -0500

Source diff to previous version
CVE-2021-27803 A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could

Version: 2.4-0ubuntu6.7 2021-02-12 17:07:11 UTC

  wpa (2.4-0ubuntu6.7) xenial-security; urgency=medium

  * SECURITY UPDATE: P2P discovery heap overflow
    - debian/patches/CVE-2021-0326.patch: P2P: Fix copying of secondary
      device types for P2P group client
    - CVE-2021-0326
    - debian/patches/CVE-2020-12695-1.patch: WPS UPnP: Do not allow
      event subscriptions with URLs to other networks
    - debian/patches/CVE-2020-12695-2.patch: WPS UPnP: Fix event message
      generation using a long URL path
    - debian/patches/CVE-2020-12695-3.patch: WPS UPnP: Handle HTTP
      initiation failures for events more properly
    - CVE-2020-12695

 -- Steve Beattie <email address hidden> Tue, 09 Feb 2021 22:33:32 -0800

Source diff to previous version
CVE-2021-0326 In p2p_copy_client_info of p2p.c, there is a possible out of bounds wr ...
CVE-2020-12695 The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on

Version: 2.4-0ubuntu6.6 2019-09-20 10:07:06 UTC

  wpa (2.4-0ubuntu6.6) xenial-security; urgency=medium

   * SECURITY UPDATE: Incorrect indication of disconnection in certain
     - debian/patches/CVE-2019-16275.patch: silently ignore management
       frame from unexpected source address in src/ap/drv_callbacks.c,
     - CVE-2019-16275

 -- <email address hidden> (Leonidas S. Barbosa) Tue, 17 Sep 2019 08:41:25 -0300

Source diff to previous version
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address valida

Version: 2.4-0ubuntu6.5 2019-05-07 15:07:07 UTC

  wpa (2.4-0ubuntu6.5) xenial-security; urgency=medium

  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

 -- Marc Deslauriers <email address hidden> Wed, 01 May 2019 09:59:21 -0400

Source diff to previous version
CVE-2019-11555 The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly sta

Version: 2.4-0ubuntu6.4 2019-04-10 18:07:19 UTC

  wpa (2.4-0ubuntu6.4) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
    - CVE-2016-10743

 -- Marc Deslauriers <email address hidden> Tue, 09 Apr 2019 07:29:43 -0400

CVE-2019-9495 cache attack against EAP-pwd
CVE-2019-9497 EAP-pwd server not checking for reflection attack
CVE-2019-9498 EAP-pwd server missing commit validation for scalar/element
CVE-2019-9499 EAP-pwd peer missing commit validation for scalar/element
CVE-2016-10743 hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.

About   -   Send Feedback to @ubuntu_updates