The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x
through 2.8 are vulnerable to side-channel attacks as a result of observable
timing differences and cache access patterns when Brainpool curves are used.
An attacker may be able to gain leaked information from a side-channel
attack that can be used for full password recovery.
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect
indication of disconnection in certain situations because source address
validation is mishandled. This is a denial of service that should have been
prevented by PMF (aka management frame protection). The attacker must send a
crafted 802.11 frame from a location that is within the 802.11
2.9 has been in the tree a while. I added the patch and stabled wpa_supplicant-2.9-r1 on amd64 and x86. Please proceed.
@arches, please stabilize.
old and vulnerable removed, thanks all. Security, this bug is yours.