This bug was fixed in the package wpa - 2:2.9-1ubuntu10

---------------
wpa (2:2.9-1ubuntu10) hirsute; urgency=medium

  * debian/patches/git_dbus_bridge.patch
    - Allow changing an interface bridge via D-Bus (lp: #1893563)

  [ Andrej Shadura ]
  * Security fix: CVE-2020-12695.
    A vulnerability in the UPnP SUBSCRIBE command can trigger the AP to
    initiate a HTTP (TCP/IP) connection to an arbitrary URL or to trigger
    misbehavior in hostapd and cause the process to either get terminated
    or to start using more CPU resources.
    The issue can also be mitigated by building hostapd without UPnP support
    (CONFIG_WPS_UPNP=n) or disabling it at runtime by removing the upnp_iface
    parameter.
    (Closes: #976106)

  [ Paolo Pisati ]
  * debian/patches/nl80211-Unbreak-mode-processing-due-to-presence-of-S.patch:
    - backport upstream fix (commit 52a1b28345123c374fd0127cbce623c41a760730)
      for S1G band (lp: #1912609)

 -- Sebastien Bacher <[email protected]>  Thu, 28 Jan 2021 15:10:07
+0100

** Changed in: wpa (Ubuntu Hirsute)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12695

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912609

Title:
  mac80211_hwsim: hostapd fails to start with S1G band

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1912609/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to