Search CVE reports


Toggle filters

21 – 30 of 59 results


CVE-2019-5062

Negligible priority
Needs evaluation

An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2019-5061

Low priority

Some fixes available 9 of 16

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2019-2053

Negligible priority
Vulnerable

In wnm_parse_neighbor_report_elem of wnm_sta.c, there is a possible out-of-bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Not affected Not affected Not affected Vulnerable
Show less packages

CVE-2019-16275

Medium priority
Fixed

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented...

2 affected packages

wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Fixed
wpasupplicant Not in release
Show less packages

CVE-2019-13377

Medium priority
Fixed

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Fixed
Show less packages

CVE-2019-11555

Medium priority
Fixed

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Fixed
Show less packages

CVE-2019-10064

Low priority
Vulnerable

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Not affected Not affected Not affected Not affected
Show less packages

CVE-2018-14526

Medium priority
Fixed

An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Fixed
Show less packages

CVE-2017-13088

High priority
Fixed

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa
Show less packages

CVE-2017-13087

High priority
Fixed

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio...

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa
Show less packages