CVE-2019-13377 (https://nvd.nist.gov/vuln/detail/CVE-2019-13377): The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery. CVE-2019-16275 (https://nvd.nist.gov/vuln/detail/CVE-2019-16275): hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
2.9 has been in the tree a while. I added the patch and stabled wpa_supplicant-2.9-r1 on amd64 and x86. Please proceed.
@arches, please stabilize.
arm64 stable
ppc64 stable
ppc stable
arm stable
old and vulnerable removed, thanks all. Security, this bug is yours.