It was discovered that wpa_supplicant and hostapd were vulnerable to a side channel attack against EAP-pwd. A remote attacker could possibly use this issue to recover certain passwords. (CVE-2019-9495)
Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly validated received scalar and element values in EAP-pwd-Commit messages. A remote attacker could possibly use this issue to perform a reflection attack and authenticate without the appropriate password. (CVE-2019-9497, CVE-2019-9498, CVE-2019-9499)
It was discovered that hostapd incorrectly handled obtaining random numbers. In rare cases where the urandom device isn't available, it would fall back to using a low-quality PRNG. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10743)
{ "availability": "No subscription required", "binaries": [ { "hostapd-dbgsym": "1:2.1-0ubuntu1.7", "wpasupplicant-udeb": "2.1-0ubuntu1.7", "wpagui-dbgsym": "2.1-0ubuntu1.7", "hostapd": "1:2.1-0ubuntu1.7", "wpagui": "2.1-0ubuntu1.7", "wpasupplicant": "2.1-0ubuntu1.7", "wpasupplicant-udeb-dbgsym": "2.1-0ubuntu1.7", "wpasupplicant-dbgsym": "2.1-0ubuntu1.7" } ] }
{ "availability": "No subscription required", "binaries": [ { "hostapd-dbgsym": "1:2.4-0ubuntu6.4", "wpasupplicant-udeb": "2.4-0ubuntu6.4", "wpagui-dbgsym": "2.4-0ubuntu6.4", "hostapd": "1:2.4-0ubuntu6.4", "wpagui": "2.4-0ubuntu6.4", "wpasupplicant": "2.4-0ubuntu6.4", "wpasupplicant-udeb-dbgsym": "2.4-0ubuntu6.4", "wpasupplicant-dbgsym": "2.4-0ubuntu6.4" } ] }
{ "availability": "No subscription required", "binaries": [ { "hostapd-dbgsym": "2:2.6-15ubuntu2.2", "wpasupplicant-udeb": "2:2.6-15ubuntu2.2", "wpagui-dbgsym": "2:2.6-15ubuntu2.2", "hostapd": "2:2.6-15ubuntu2.2", "wpagui": "2:2.6-15ubuntu2.2", "wpasupplicant": "2:2.6-15ubuntu2.2", "wpasupplicant-dbgsym": "2:2.6-15ubuntu2.2" } ] }