FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations.
d9b765e8617c1094fd1b44bc80bae21176c9518147b96b6da2dc72d5f4fecdd6
Debian Linux Security Advisory 4430-1 - Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found multiple vulnerabilities in the WPA implementation found in wpa_supplication (station) and hostapd (access point). These vulnerability are also collectively known as "Dragonblood".
e4cc520a6f88594171e81ee3cde6f6aec1740ca7d34b2fc6ac799e9719e96151
Ubuntu Security Notice 3944-1 - It was discovered that wpa_supplicant and hostapd were vulnerable to a side channel attack against EAP-pwd. A remote attacker could possibly use this issue to recover certain passwords. Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly validated received scalar and element values in EAP-pwd-Commit messages. A remote attacker could possibly use this issue to perform a reflection attack and authenticate without the appropriate password. Various other issues were also addressed.
5cd1105b2e54bffc81e4ab1e2261cd73be7cd130544105c2d7414ca3f2dcf45e