Mageia 2022-0025: wpa_supplicant security update
Summary
The implementations of SAE in hostapd before 2.10 and wpa_supplicant
before 2.10 are vulnerable to side channel attacks as a result of cache
access patterns. NOTE: this issue exists because of an incomplete fix for
CVE-2019-9494.
References
- https://bugs.mageia.org/show_bug.cgi?id=29899
- https://w1.fi/security/2022-1/sae-eap-pwd-side-channel-attack-update-2.txt
- https://nvd.nist.gov/vuln/detail/CVE-2022-23303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303
Resolution
MGASA-2022-0025 - Updated wpa_supplicant packages fix security vulnerability
SRPMS
- 8/core/wpa_supplicant-2.9-8.3.mga8