notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Hardware failure

The website is running on the old server. The new server stopped working at about 0200 UTC on 2020-08-22. The database was restored from 2020-08-21 00:59:15+00 UTC. We think we have covered all commits. Nothing should be missing. Any changes you made to your accounts after the restore date will be lost. Sorry about that.
non port: net/hostapd/distinfo
SVNWeb

Number of commits found XX: 15

Tue, 9 Jun 2020
[ 05:48 cy ] Original commit   Revision:538281
538281 net/hostapd/Makefile
538281 net/hostapd/distinfo
538281 security/wpa_supplicant/Makefile
538281 security/wpa_supplicant/distinfo
538281 security/wpa_supplicant/files/patch-src_wps_wps__upnp.c
UPnP SUBSCRIBE misbehavior in hostapd WPS AP

As published by our hostapd  upstream

Vulnerability

General security vulnerability in the way the callback URLs in the UPnP
SUBSCRIBE command are used were reported (VU#339275, CVE-2020-12695).
Some of the described issues may be applicable to the use of UPnP in WPS
AP mode functionality for supporting external registrars.

Such issues could allow a device connected to the local network (i.e., a
device that has been authorized to transmit packets in the network in
which the AP is located) could trigger the AP to initiate a HTTP
(TCP/IP) connection to an arbitrary URL, including connections to
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 22 Aug 2019
[ 03:33 cy ] Original commit   Revision:509577
509577 net/hostapd/Makefile
509577 net/hostapd/distinfo
Update 2.8 --> 2.9
Mon, 22 Apr 2019
[ 15:56 cy ] Original commit   Revision:499654
499654 net/hostapd/Makefile
499654 net/hostapd/distinfo
499654 security/wpa_supplicant/Makefile
499654 security/wpa_supplicant/distinfo
Update wpa_supplicant/hostapd 2.7 --> 2.8
Thu, 6 Dec 2018
[ 20:11 cy ] Original commit   Revision:486778
486778 net/hostapd/Makefile
486778 net/hostapd/distinfo
486778 net/hostapd/files/patch-crypto__openssl.c
486778 net/hostapd/files/patch-src_common_dhcp.h
486778 net/hostapd/files/patch-src_crypto_tls__openssl.c
Update 2.6 --> 2.7
Fri, 17 Aug 2018
[ 02:12 cy ] Original commit   Revision:477403
477403 net/hostapd/Makefile
477403 net/hostapd/distinfo
Chase net/wpa_supplicant r477202 and base contrib/wpa r337819.

WPA: Ignore unauthenticated encrypted EAPOL-Key data

Though hostapd is technically not vulnerable, the mitigation for
CVE-2018-14526 does apply cleanly, therefore it is applied to maintain
consistency with net/wpa_supplicant and wpa in base.

Approved by:	leres@
MFH:		2018Q3
Differential Revision:	https://reviews.freebsd.org/D16718
Tue, 17 Oct 2017
[ 01:30 cy ] Original commit   Revision:452257
452257 net/hostapd/Makefile
452257 net/hostapd/distinfo
Add patch set 2017-1.

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Approved by:	leres (maintainer)
Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
Differential Revision:	D12691
Tue, 21 Mar 2017
[ 17:50 krion ] Original commit   Revision:436625
436625 net/hostapd/Makefile
436625 net/hostapd/distinfo
436625 net/hostapd/files/patch-src-l2_packet-l2_packet_freebsd.c
436625 net/hostapd/files/patch-src_crypto_tls__openssl.c
Update net/hostapd to 2.6 and fix multiple vulnerabilities

PR:		217907
Submitted by:	maintainer
Approved by:	mat (mentor)
Differential Revision: https://reviews.freebsd.org/D10051
Fri, 23 Sep 2016
[ 18:20 madpilot ] Original commit   Revision:422688
422688 net/hostapd/Makefile
422688 net/hostapd/distinfo
422688 net/hostapd/files/patch-src_ap_wmm.c
422688 net/hostapd/files/patch-src_drivers_driver__bsd.c
422688 net/hostapd/files/patch-src_eap__peer_eap__pwd.c
422688 net/hostapd/files/patch-src_eap__server_eap__server__pwd.c
422688 net/hostapd/files/patch-src_utils_os.h
422688 net/hostapd/files/patch-src_utils_os__unix.c
422688 net/hostapd/files/patch-src_wps_httpread.c
Update to 2.5

PR:		212779
Submitted by:	leres at ee.lbl.gov (maintainer)
Sun, 29 Mar 2015
[ 12:15 marino ] Original commit   Revision:382595
382595 net/hostapd/Makefile
382595 net/hostapd/distinfo
net/hostapd: Upgrade version 2.3 => 2.4, add PORTS_SSL option

PR:		198889
Submitted by:	maintainer (leres - ee.lbl.gov)
Thu, 16 Oct 2014
[ 07:19 marino ] Original commit   Revision:370974
370974 net/hostapd/Makefile
370974 net/hostapd/distinfo
370974 net/hostapd/files/config
net/hostapd: Upgrade version 2.2 => 2.3

While upgrading to the latest version released last week:
  * Rebase .config file on latest sample versoin
  * Support non-default prefixes
  * Merge new contents of do-configure target into post-patch target

PR:		194315
Approved by:	maintainer: (Craig Leres)
Sat, 7 Jun 2014
[ 05:26 danilo ] Original commit   Revision:356881
356881 net/hostapd/Makefile
356881 net/hostapd/distinfo
- Update from 2.1 to 2.2 [1]
- Use just BSD3CLAUSE as LICENSE (according to README)

PR:		ports/190726
Submitted by:	leres@ee.lbl.gov [1]
Thu, 13 Mar 2014
[ 10:06 pawel ] Original commit   Revision:348049
348049 net/hostapd/Makefile
348049 net/hostapd/distinfo
Update to version 2.1

PR:		ports/187459
Submitted by:	maintainer
Sat, 2 Feb 2013
[ 11:44 pawel ] Original commit   Revision:311422
311422 net/hostapd/Makefile
311422 net/hostapd/distinfo
311422 net/hostapd/files/config
Update to version 2.0

PR:		ports/175438
Submitted by:	Craig Leres <leres@ee.lbl.gov> (maintainer)
Mon, 18 Jun 2012
[ 22:27 jgh ] Original commit 
1.4 net/hostapd/Makefile
1.2 net/hostapd/distinfo
- Update to 1.0
- Use ports framework for build:
  - Bonus: Now honours CC/CFLAGS/LDFLAGS
- Remove DISTNAME override
- Update LICENSE (GPLv2 not GPLv1)
- Mark MAKE_JOBS_SAFE
- Patch Makefile to see $(CC) not "CC" when not verbose
- Pet portlint (LICENSE order)

- while here shift where arch is tested, and use MAN{1,8}PREFIX

PR:     ports/169154 (based on)
Submitted by:   koobs.freebsd@gmail.com
Approved by:    maintainer, leres@ee.lbl.gov
Sat, 12 Feb 2011
[ 04:52 miwi ] Original commit 
1.2313 net/Makefile
1.1 net/hostapd/Makefile
1.1 net/hostapd/distinfo
1.1 net/hostapd/files/config
1.1 net/hostapd/files/patch-src-l2_packet-l2_packet_freebsd.c
1.1 net/hostapd/pkg-descr
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

WWW: http://hostap.epitest.fi/hostapd/

PR:             ports/154621
Submitted by:   leres at ee.lbl.gov

Number of commits found XX: 15

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
mariadb103-clientOct 18
mariadb103-serverOct 18
mariadb104-clientOct 18
mariadb104-serverOct 18
mariadb105-clientOct 18
mariadb105-serverOct 18
drupal7Oct 17
py-matrix-synapseOct 17
powerdns-recursorOct 14
linux-flashplayerOct 13
rubygem-actionpack60Oct 10
chromiumOct 07
zeekOct 07
payaraOct 06
payaraOct 06

12 vulnerabilities affecting 83 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-10-19 10:27:15


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 41097
Broken 56
Deprecated 275
Ignore 293
Forbidden 4
Restricted 146
No CDROM 73
Vulnerable 22
Expired 10
Set to expire 246
Interactive 0
new 24 hours 0
new 48 hours0
new 7 days12
new fortnight52
new month155

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.