Search CVE reports
11 – 20 of 57 results
CVE-2019-5062
Negligible priorityAn exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-5061
Low prioritySome fixes available 8 of 15
An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Fixed | Fixed | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-9243
Low priorityIn wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | Not affected | Not affected | Not affected | Not affected |
CVE-2019-9234
Low priorityIn wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | Not affected | Not affected | Not affected | Not affected |
CVE-2019-9233
Low priorityIn wpa_supplicant_8, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Not affected | Not affected | Vulnerable | Vulnerable | Not affected |
CVE-2019-16275
Medium priorityhostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |
CVE-2019-13377
Medium priorityThe implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Not affected |
CVE-2019-2053
Negligible priorityIn wnm_parse_neighbor_report_elem of wnm_sta.c, there is a possible out-of-bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | Not affected | Not affected | Not affected | Vulnerable | Vulnerable |
CVE-2019-11555
Medium priorityThe EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could...
1 affected packages
wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
CVE-2019-9499
Medium priorityThe implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | Fixed | Fixed |
wpasupplicant | — | — | — | Not in release | Not in release |