CVE-2019-13377 (https://nvd.nist.gov/vuln/detail/CVE-2019-13377): The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery. CVE-2019-16275 (https://nvd.nist.gov/vuln/detail/CVE-2019-16275): hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
*** Bug 696024 has been marked as a duplicate of this bug. ***
*** Bug 696028 has been marked as a duplicate of this bug. ***
*** Bug 696026 has been marked as a duplicate of this bug. ***
Both dependent bugs are patched, stabilized, and cleaned up. Everything that remains is for security.
buh-bye