The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpasupplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eapserver/eapserverpwd.c and eappeer/eappwd.c.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "hostapd",
"binary_version": "1:2.1-0ubuntu1.7+esm1"
},
{
"binary_name": "wpagui",
"binary_version": "2.1-0ubuntu1.7+esm1"
},
{
"binary_name": "wpasupplicant",
"binary_version": "2.1-0ubuntu1.7+esm1"
}
]
}