UBUNTU-CVE-2025-24912

Source
https://ubuntu.com/security/CVE-2025-24912
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-24912
Related
Withdrawn
2025-06-23T16:00:35Z
Published
2025-03-12T05:15:00Z
Modified
2026-02-04T04:00:57.696325Z
Summary
[none]
Details

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

References

Affected packages

Ubuntu:20.04:LTS
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2:2.9-1ubuntu4.6?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:2.*
2:2.9-1ubuntu2
2:2.9-1ubuntu3
2:2.9-1ubuntu4
2:2.9-1ubuntu4.1
2:2.9-1ubuntu4.2
2:2.9-1ubuntu4.3
2:2.9-1ubuntu4.4
2:2.9-1ubuntu4.6

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"
Ubuntu:22.04:LTS
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2:2.10-6ubuntu2.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:2.*
2:2.9.0-21build1
2:2.9.0-23
2:2.10-1
2:2.10-2
2:2.10-6
2:2.10-6ubuntu1
2:2.10-6ubuntu2
2:2.10-6ubuntu2.1
2:2.10-6ubuntu2.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"
Ubuntu:24.04:LTS
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2:2.10-21ubuntu0.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:2.*
2:2.10-15
2:2.10-18
2:2.10-20
2:2.10-21
2:2.10-21build2
2:2.10-21build3
2:2.10-21build4
2:2.10-21ubuntu0.1
2:2.10-21ubuntu0.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"
Ubuntu:24.10
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2:2.10-22ubuntu0.1?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:2.*
2:2.10-21build4
2:2.10-21.1
2:2.10-22
2:2.10-22ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"
Ubuntu:Pro:14.04:LTS
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2.1-0ubuntu1.7+esm5?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.0-3ubuntu2
1.0-3ubuntu3
1.0-3ubuntu4
2.*
2.1-0ubuntu1
2.1-0ubuntu1.1
2.1-0ubuntu1.2
2.1-0ubuntu1.3
2.1-0ubuntu1.4
2.1-0ubuntu1.5
2.1-0ubuntu1.6
2.1-0ubuntu1.7
2.1-0ubuntu1.7+esm2
2.1-0ubuntu1.7+esm3
2.1-0ubuntu1.7+esm4
2.1-0ubuntu1.7+esm5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"
Ubuntu:Pro:16.04:LTS
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2.4-0ubuntu6.8+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4-0ubuntu3
2.4-0ubuntu4
2.4-0ubuntu5
2.4-0ubuntu6
2.4-0ubuntu6.2
2.4-0ubuntu6.3
2.4-0ubuntu6.4
2.4-0ubuntu6.5
2.4-0ubuntu6.6
2.4-0ubuntu6.7
2.4-0ubuntu6.8
2.4-0ubuntu6.8+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"
Ubuntu:Pro:18.04:LTS
wpa

Package

Name
wpa
Purl
pkg:deb/ubuntu/wpa@2:2.6-15ubuntu2.8+esm1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4-0ubuntu10
2:2.*
2:2.4-1.1ubuntu1
2:2.6-15ubuntu1
2:2.6-15ubuntu2
2:2.6-15ubuntu2.1
2:2.6-15ubuntu2.2
2:2.6-15ubuntu2.3
2:2.6-15ubuntu2.4
2:2.6-15ubuntu2.5
2:2.6-15ubuntu2.6
2:2.6-15ubuntu2.7
2:2.6-15ubuntu2.8
2:2.6-15ubuntu2.8+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-24912.json"