Ubuntu 3944-1: wpa_supplicant and hostapd vulnerabilities

    Date10 Apr 2019
    CategoryUbuntu
    2521
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in wpa_supplicant and hostapd.
    ==========================================================================
    Ubuntu Security Notice USN-3944-1
    April 10, 2019
    
    wpa vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 18.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    
    Summary:
    
    Several security issues were fixed in wpa_supplicant and hostapd.
    
    Software Description:
    - wpa: client support for WPA and WPA2
    
    Details:
    
    It was discovered that wpa_supplicant and hostapd were vulnerable to a
    side channel attack against EAP-pwd. A remote attacker could possibly use
    this issue to recover certain passwords. (CVE-2019-9495)
    
    Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly
    validated received scalar and element values in EAP-pwd-Commit messages. A
    remote attacker could possibly use this issue to perform a reflection
    attack and authenticate without the appropriate password. (CVE-2019-9497,
    CVE-2019-9498, CVE-2019-9499)
    
    It was discovered that hostapd incorrectly handled obtaining random
    numbers. In rare cases where the urandom device isn't available, it would
    fall back to using a low-quality PRNG. This issue only affected Ubuntu
    14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10743)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 18.10:
      hostapd                         2:2.6-18ubuntu1.1
      wpasupplicant                   2:2.6-18ubuntu1.1
    
    Ubuntu 18.04 LTS:
      hostapd                         2:2.6-15ubuntu2.2
      wpasupplicant                   2:2.6-15ubuntu2.2
    
    Ubuntu 16.04 LTS:
      hostapd                         2.4-0ubuntu6.4
      wpasupplicant                   2.4-0ubuntu6.4
    
    Ubuntu 14.04 LTS:
      hostapd                         2.1-0ubuntu1.7
      wpasupplicant                   2.1-0ubuntu1.7
    
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
    
    References:
      https://usn.ubuntu.com/usn/usn-3944-1
      CVE-2016-10743, CVE-2019-9495, CVE-2019-9497, CVE-2019-9498,
      CVE-2019-9499
    
    Package Information:
      https://launchpad.net/ubuntu/+source/wpa/2:2.6-18ubuntu1.1
      https://launchpad.net/ubuntu/+source/wpa/2:2.6-15ubuntu2.2
      https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.4
      https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.7
    
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"5","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.