File _patchinfo of Package patchinfo.16058

<patchinfo incident="16058">
  <issue tracker="cve" id="2020-12695"/>
  <issue tracker="cve" id="2021-30004"/>
  <issue tracker="cve" id="2019-16275"/>
  <issue tracker="bnc" id="1184348">VUL-0: CVE-2021-30004: wpa_supplicant, hostapd: forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c</issue>
  <issue tracker="bnc" id="1150934">VUL-1: CVE-2019-16275: wpa_supplicant,hostapd: AP mode PMF disconnection</issue>
  <issue tracker="bnc" id="1172700">VUL-0: CVE-2020-12695: hostapd: UPnP SUBSCRIBE misbehavior WPS AP</issue>
  <packager>cfconrad</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for hostapd</summary>
  <description>This update for hostapd fixes the following issues:

- CVE-2021-30004: forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c (boo#1184348)
- CVE-2020-12695: UPnP SUBSCRIBE misbehavior in hostapd WPS AP (boo#1172700)
- CVE-2019-16275: AP mode PMF disconnection protection bypass (boo#1150934) 

- added AppArmor profile (source apparmor-usr.sbin.hostapd)

This update was imported from the openSUSE:Leap:15.2:Update update project.</description>
</patchinfo>
openSUSE Build Service is sponsored by