The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpasupplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eapserver/eapserverpwd.c and eappeer/eappwd.c.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:2.1-0ubuntu1.7+esm1", "binary_name": "hostapd" }, { "binary_version": "2.1-0ubuntu1.7+esm1", "binary_name": "wpagui" }, { "binary_version": "2.1-0ubuntu1.7+esm1", "binary_name": "wpasupplicant" } ] }