1
Candidate: CVE-2012-2389
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2389
5
http://www.openwall.com/lists/oss-security/2012/05/23/13
7
hostapd 0.7.3, and possibly other versions before 1.0, uses 0644
8
permissions for /etc/hostapd/hostapd.conf, which might allow local users to
9
obtain sensitive information such as credentials.
12
jdstrand> per Debian, wpa does not ship a configuration file
14
https://bugzilla.novell.com/show_bug.cgi?id=740964
20
upstream_hostapd: needs-triage
21
hardy_hostapd: ignored (reached end-of-life)
22
lucid_hostapd: ignored (reached end-of-life)
23
natty_hostapd: ignored (reached end-of-life)
24
oneiric_hostapd: ignored (reached end-of-life)
25
precise_hostapd: ignored (reached end-of-life)
26
precise/esm_hostapd: DNE (precise was needed)
33
vivid/stable-phone-overlay_hostapd: DNE
34
vivid/ubuntu-core_hostapd: DNE
42
upstream_wpa: needs-triage
49
quantal_wpa: not-affected
50
raring_wpa: not-affected
51
saucy_wpa: not-affected
52
trusty_wpa: not-affected
53
utopic_wpa: not-affected
54
vivid_wpa: not-affected
55
vivid/stable-phone-overlay_wpa: not-affected
56
vivid/ubuntu-core_wpa: not-affected
57
wily_wpa: not-affected
58
xenial_wpa: not-affected
59
yakkety_wpa: not-affected
60
zesty_wpa: not-affected
61
devel_wpa: not-affected