Change logs for wpa source package in Xenial

  • wpa (2.4-0ubuntu6.8) xenial-security; urgency=medium
    
      * SECURITY UPDATE: DoS and possible code execution via P2P provision
        discovery requests
        - debian/patches/CVE-2021-27803-pre1.patch: cleanup handling of unknown
          peer in PD Request processing in src/p2p/p2p_pd.c.
        - debian/patches/CVE-2021-27803.patch: fix a corner case in peer
          addition based on PD Request in src/p2p/p2p_pd.c.
        - CVE-2021-27803
    
     -- Marc Deslauriers <email address hidden>  Mon, 01 Mar 2021 09:36:31 -0500
  • wpa (2.4-0ubuntu6.7) xenial-security; urgency=medium
    
      * SECURITY UPDATE: P2P discovery heap overflow
        - debian/patches/CVE-2021-0326.patch: P2P: Fix copying of secondary
          device types for P2P group client
        - CVE-2021-0326
      * SECURITY UPDATE: UPnP SUBSCRIBE misbehavior in WPS AP
        - debian/patches/CVE-2020-12695-1.patch: WPS UPnP: Do not allow
          event subscriptions with URLs to other networks
        - debian/patches/CVE-2020-12695-2.patch: WPS UPnP: Fix event message
          generation using a long URL path
        - debian/patches/CVE-2020-12695-3.patch: WPS UPnP: Handle HTTP
          initiation failures for events more properly
        - CVE-2020-12695
    
     -- Steve Beattie <email address hidden>  Tue, 09 Feb 2021 22:33:32 -0800
  • wpa (2.4-0ubuntu6.6) xenial-security; urgency=medium
    
       * SECURITY UPDATE: Incorrect indication of disconnection in certain
         situations
         - debian/patches/CVE-2019-16275.patch: silently ignore management
           frame from unexpected source address in src/ap/drv_callbacks.c,
           src/ap/ieee882_11.c.
         - CVE-2019-16275
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 17 Sep 2019 08:41:25 -0300
  • wpa (2.4-0ubuntu6.5) xenial-security; urgency=medium
    
      * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
        - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
          in src/eap_server/eap_server_pwd.c.
        - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
          in src/eap_peer/eap_pwd.c.
        - CVE-2019-11555
    
     -- Marc Deslauriers <email address hidden>  Wed, 01 May 2019 09:59:21 -0400
  • wpa (2.4-0ubuntu6.4) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Multiple security issues
        - debian/patches/VU-871675/*.patch: backported upstream patches.
        - CVE-2019-9495
        - CVE-2019-9497
        - CVE-2019-9498
        - CVE-2019-9499
      * SECURITY UPDATE: insecure os_random() fallback
        - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
          generation.
        - CVE-2016-10743
    
     -- Marc Deslauriers <email address hidden>  Tue, 09 Apr 2019 07:29:43 -0400
  • wpa (2.4-0ubuntu6.3) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Expose sensitive information
        - debian/patches/CVE-2018-14526.patch: fix in src/rsn_supp/wpa.c.
        - CVE-2018-14526
    
     -- <email address hidden> (Leonidas S. Barbosa)  Thu, 09 Aug 2018 12:51:53 -0300
  • wpa (2.4-0ubuntu6.2) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Multiple issues in WPA protocol
        - debian/patches/2017-1/*.patch: Add patches from Debian stretch
        - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
          CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
          CVE-2017-13088
      * SECURITY UPDATE: Denial of service issues
        - debian/patches/2016-1/*.patch: Add patches from Debian stretch
        - CVE-2016-4476
        - CVE-2016-4477
      * This package does _not_ contain the changes from 2.4-0ubuntu6.1 in
        xenial-proposed.
    
     -- Marc Deslauriers <email address hidden>  Mon, 16 Oct 2017 07:58:48 -0400
  • wpa (2.4-0ubuntu6.1) xenial; urgency=medium
    
      * debian/patches/wpa_service_ignore-on-isolate.patch: Add IgnoreOnIsolate=yes
        so when isolating to default.target as oem-config does, we don't stop
        wpasupplicant and cause wifi to be unavailable. (LP: #1576024)
    
     -- Mathieu Trudel-Lapierre <email address hidden>  Thu, 31 Aug 2017 14:31:25 -0400
  • wpa (2.4-0ubuntu6) xenial; urgency=medium
    
      * debian/patches/wpasupplicant_band_selection_aa517ae2.patch: add the last
        missing 5 GHz band selection related cherry-pick from Debian that was not
        included in wpa 2.4 (LP: #1517040)
    
     -- Timo Jyrinki <email address hidden>  Tue, 19 Jan 2016 12:36:00 +0200
  • wpa (2.4-0ubuntu5) xenial; urgency=medium
    
      * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
        - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
          Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
        - CVE-2015-5310
      * SECURITY UPDATE: EAP-pwd missing last fragment length validation
        - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
          validation in src/eap_peer/eap_pwd.c.
        - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
          validation in src/eap_server/eap_server_pwd.c.
        - CVE-2015-5315
      * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
        message
        - debian/patches/CVE-2015-5316.patch: fix error path in
          src/eap_peer/eap_pwd.c.
        - CVE-2015-5316
      * SECURITY UPDATE: denial of service in NDEF record parser
        - debian/patches/CVE-2015-8041.patch: validate payload lengths in
          src/wps/ndef.c.
        - CVE-2015-8041
    
     -- Marc Deslauriers <email address hidden>  Tue, 10 Nov 2015 13:38:25 -0500
  • wpa (2.4-0ubuntu4) xenial; urgency=medium
    
      * Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume
        before/after suspend, like the pm-utils hook. In some cases this brings
        back missing Wifi connection after resuming. (LP: #1422143)
    
     -- Martin Pitt <email address hidden>  Mon, 26 Oct 2015 14:24:30 +0100
  • wpa (2.4-0ubuntu3) wily; urgency=medium
    
      * debian/patches/dbus-fix-operations-for-p2p-mgmt.patch: fix operations
        when P2P management interface is used (LP: #1482439)
    
     -- Ricardo Salveti de Araujo <email address hidden>  Wed, 07 Oct 2015 10:21:39 -0300