CVE-2019-5061

Priority
Description
An exploitable denial-of-service vulnerability exists in the hostapd 2.6,
where an attacker could trigger AP to send IAPP location updates for
stations, before the required authentication process has completed. This
could lead to different denial of service scenarios, either by causing CAM
table attacks, or by leading to traffic flapping if faking already existing
clients in other nearby Aps of the same wireless infrastructure. An
attacker can forge Authentication and Association Request packets to
trigger this vulnerability.
Notes
Package
Source: wpa (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-01-29 19:03:06 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)