hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
{ "binaries": [ { "binary_version": "1:2.1-0ubuntu1.5", "binary_name": "hostapd" }, { "binary_version": "2.1-0ubuntu1.5", "binary_name": "wpagui" }, { "binary_version": "2.1-0ubuntu1.5", "binary_name": "wpasupplicant" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4476.json"
{ "binaries": [ { "binary_version": "1:2.4-0ubuntu6.2", "binary_name": "hostapd" }, { "binary_version": "2.4-0ubuntu6.2", "binary_name": "wpagui" }, { "binary_version": "2.4-0ubuntu6.2", "binary_name": "wpasupplicant" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "1:2.4-0ubuntu10", "binary_name": "hostapd" }, { "binary_version": "2.4-0ubuntu10", "binary_name": "wpagui" }, { "binary_version": "2.4-0ubuntu10", "binary_name": "wpasupplicant" } ], "availability": "No subscription required" }