George Chatzisofroniou and Panayiotis Kotzanikolaou discovered that wpa_supplicant and hostapd reused encryption elements in the PKEX protocol. An attacker could possibly use this issue to impersonate a wireless access point, and obtain sensitive information. (CVE-2022-37660)
Daniel De Almeida Braga, Mohamed Sabt, and Pierre-Alain Fouque discovered that wpa_supplicant and hostapd were vulnerable to side channel attacks due to the cache access patterns. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-23303, CVE-2022-23304)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "hostapd" }, { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "hostapd-dbgsym" }, { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "wpagui" }, { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "wpagui-dbgsym" }, { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "wpasupplicant" }, { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "wpasupplicant-dbgsym" }, { "binary_version": "2:2.9-1ubuntu4.6", "binary_name": "wpasupplicant-udeb" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "eapoltest" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "eapoltest-dbgsym" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "hostapd" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "hostapd-dbgsym" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "libwpa-client-dev" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "wpagui" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "wpagui-dbgsym" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "wpasupplicant" }, { "binary_version": "2:2.10-6ubuntu2.2", "binary_name": "wpasupplicant-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "eapoltest" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "eapoltest-dbgsym" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "hostapd" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "hostapd-dbgsym" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "libwpa-client-dev" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "wpagui" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "wpagui-dbgsym" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "wpasupplicant" }, { "binary_version": "2:2.10-22ubuntu0.1", "binary_name": "wpasupplicant-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "eapoltest" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "eapoltest-dbgsym" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "hostapd" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "hostapd-dbgsym" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "libwpa-client-dev" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "wpagui" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "wpagui-dbgsym" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "wpasupplicant" }, { "binary_version": "2:2.10-21ubuntu0.2", "binary_name": "wpasupplicant-dbgsym" } ] }