[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:54399
wpa: client support for WPA and WPA2 Several security issues were fixed in wpa_supplicant and hostapd.

oval:org.secpod.oval:def:54400
wpa: client support for WPA and WPA2 Several security issues were fixed in wpa_supplicant and hostapd.

oval:org.secpod.oval:def:54504
Mathy Vanhoef and Eyal Ronen found multiple vulnerabilities in the WPA implementation found in wpa_supplication and hostapd . These vulnerability are also collectively known as "Dragonblood". CVE-2019-9495 Cache-based side-channel attack against the EAP-pwd implementation: an attacker a ...

oval:org.secpod.oval:def:54266
wpa: client support for WPA and WPA2 Several security issues were fixed in wpa_supplicant and hostapd.

oval:org.secpod.oval:def:116302
hostapd is a user space daemon for access point and authentication servers. It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server. hostapd is designed to be a "daemon" program that runs in the back-ground and acts as the ...

oval:org.secpod.oval:def:116301
hostapd is a user space daemon for access point and authentication servers. It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server. hostapd is designed to be a "daemon" program that runs in the back-ground and acts as the ...

oval:org.secpod.oval:def:89046352
This update for wpa_supplicant fixes the following issues: - CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks - CVE-2021-0326: Fixed P2P group information processing vulnerability - Fix systemd device ready dependencies in wpa_supplicant at .service file. - Limit P2P_DEVICE ...

oval:org.secpod.oval:def:704884
wpa: client support for WPA and WPA2 Several security issues were fixed in wpa_supplicant and hostapd.

oval:org.secpod.oval:def:603848
Mathy Vanhoef and Eyal Ronen found multiple vulnerabilities in the WPA implementation found in wpa_supplication and hostapd . These vulnerability are also collectively known as Dragonblood. CVE-2019-9495 Cache-based side-channel attack against the EAP-pwd implementation: an attacker able to run u ...

oval:org.secpod.oval:def:89000086
This update for wpa_supplicant fixes the following issues: Security issue fixed: - CVE-2019-16275: Fixed an AP mode PMF disconnection protection bypass . Non-security issues fixed: - Enable SAE support . - Limit P2P_DEVICE name to appropriate ifname size. - Fix wicked wlan - Restore fi.epitest.host ...

oval:org.secpod.oval:def:89000520
This update for wpa_supplicant fixes the following issues: wpa_supplicant was updated to 2.9 release: * SAE changes - disable use of groups using Brainpool curves - improved protection against side channel attacks [https://w1.fi/security/2019-6/] * EAP-pwd changes - disable use of groups using Brain ...

CPE    3
cpe:/o:debian:debian_linux:8.0
cpe:/a:w1.fi:hostapd
cpe:/a:w1.fi:wpa_supplicant
CWE    1
CWE-203
*CVE
CVE-2019-9495

© SecPod Technologies