Search CVE reports
11 – 20 of 59 results
CVE-2020-12695
Medium prioritySome fixes available 18 of 31
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka...
5 affected packages
gupnp, libupnp, minidlna, pupnp-1.8, wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gupnp | Not affected | Not affected | Fixed | Vulnerable | Vulnerable |
libupnp | Not in release | Not in release | Not in release | Vulnerable | Vulnerable |
minidlna | Not affected | Not affected | Fixed | Fixed | Fixed |
pupnp-1.8 | Not in release | Vulnerable | Vulnerable | Vulnerable | Not in release |
wpa | Fixed | Fixed | Fixed | Fixed | Fixed |
CVE-2019-10064
Low priorityhostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Not affected | Not affected | Not affected | Not affected | Vulnerable |
CVE-2019-5062
Negligible priorityAn exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-5061
Low prioritySome fixes available 8 of 15
An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Fixed | Fixed | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-9243
Low priorityIn wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | Not affected | Not affected | Not affected | Not affected |
CVE-2019-9234
Low priorityIn wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | Not affected | Not affected | Not affected | Not affected |
CVE-2019-9233
Low priorityIn wpa_supplicant_8, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Not affected | Not affected | Vulnerable | Vulnerable | Not affected |
CVE-2019-16275
Medium priorityhostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-13377
Medium priorityThe implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Not affected |
CVE-2019-2053
Negligible priorityIn wnm_parse_neighbor_report_elem of wnm_sta.c, there is a possible out-of-bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Not affected | Not affected | Not affected | Vulnerable | Vulnerable |