CVE-2019-11555

Priority
Description
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and
wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation
reassembly state properly for a case where an unexpected fragment could be
received. This could result in process termination due to a NULL pointer
dereference (denial of service). This affects eap_server/eap_server_pwd.c
and eap_peer/eap_pwd.c.
Assigned-to
mdeslaur
Notes
Package
Source: wpa (LP Ubuntu Debian)
Upstream:released (2:2.7+git20190128+0c1e29f-5)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (2.1-0ubuntu1.7+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.4-0ubuntu6.5)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:2.6-15ubuntu2.3)
Patches:
Upstream:https://w1.fi/security/2019-5/
More Information

Updated: 2020-07-28 20:06:08 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)