CVE-2019-11555 (retired)

Priority
Description
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and
wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation
reassembly state properly for a case where an unexpected fragment could be
received. This could result in process termination due to a NULL pointer
dereference (denial of service). This affects eap_server/eap_server_pwd.c
and eap_peer/eap_pwd.c.
Assigned-to
mdeslaur
Package
Source: wpa (LP Ubuntu Debian)
Upstream:released (2:2.7+git20190128+0c1e29f-5)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (2.1-0ubuntu1.7+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.4-0ubuntu6.5)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:2.6-15ubuntu2.3)
Ubuntu 18.10 (Cosmic Cuttlefish):released (2:2.6-18ubuntu1.2)
Ubuntu 19.04 (Disco Dingo):released (2:2.6-21ubuntu3.1)
Ubuntu 19.10 (Eoan):released (2:2.6-21ubuntu4)
Patches:
Upstream:https://w1.fi/security/2019-5/
More Information

Updated: 2019-05-10 15:14:52 UTC (commit 3c00b0ed9466e443831508364cb19328f87345f9)