The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x
through 2.8 are vulnerable to side-channel attacks as a result of observable
timing differences and cache access patterns when Brainpool curves are used.
An attacker may be able to gain leaked information from a side-channel
attack that can be used for full password recovery.
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect
indication of disconnection in certain situations because source address
validation is mishandled. This is a denial of service that should have been
prevented by PMF (aka management frame protection). The attacker must send a
crafted 802.11 frame from a location that is within the 802.11
*** Bug 696024 has been marked as a duplicate of this bug. ***
*** Bug 696028 has been marked as a duplicate of this bug. ***
*** Bug 696026 has been marked as a duplicate of this bug. ***
Both dependent bugs are patched, stabilized, and cleaned up. Everything that remains is for security.