Search CVE reports
21 – 30 of 59 results
CVE-2019-11555
Medium priorityThe EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
CVE-2019-9499
Medium priorityThe implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-9498
Medium priorityThe implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-9497
Medium priorityThe implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-9496
Medium priorityAn invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Not affected | Not affected |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-9495
Medium priorityThe implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-9494
Medium priorityThe implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Not affected | Not affected |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2016-10743
Low priorityhostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Not affected | Fixed |
CVE-2018-14526
Medium priorityAn issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access...
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
CVE-2017-13084
High priorityWi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
1 affected package
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | — | Not affected |