MGASA-2022-0025 - Updated wpa_supplicant packages fix security vulnerability

Publication date: 18 Jan 2022
URL: https://advisories.mageia.org/MGASA-2022-0025.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-23303

The implementations of SAE in hostapd before 2.10 and wpa_supplicant
before 2.10 are vulnerable to side channel attacks as a result of cache
access patterns. NOTE: this issue exists because of an incomplete fix for
CVE-2019-9494.

References:
- https://bugs.mageia.org/show_bug.cgi?id=29899
- https://w1.fi/security/2022-1/sae-eap-pwd-side-channel-attack-update-2.txt
- https://nvd.nist.gov/vuln/detail/CVE-2022-23303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303

SRPMS:
- 8/core/wpa_supplicant-2.9-8.3.mga8

Mageia 2022-0025: wpa_supplicant security update

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns

Summary

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

References

- https://bugs.mageia.org/show_bug.cgi?id=29899

- https://w1.fi/security/2022-1/sae-eap-pwd-side-channel-attack-update-2.txt

- https://nvd.nist.gov/vuln/detail/CVE-2022-23303

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303

Resolution

MGASA-2022-0025 - Updated wpa_supplicant packages fix security vulnerability

SRPMS

- 8/core/wpa_supplicant-2.9-8.3.mga8

Severity
Publication date: 18 Jan 2022
URL: https://advisories.mageia.org/MGASA-2022-0025.html
Type: security
CVE: CVE-2022-23303

Related News