MGASA-2020-0244

Source
https://advisories.mageia.org/MGASA-2020-0244.html
Import Source
https://advisories.mageia.org/MGASA-2020-0244.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0244
Related
Published
2020-06-10T22:26:12Z
Modified
2020-06-10T21:54:00Z
Summary
Updated wpa_supplicant packages fix security vulnerability
Details

Updated wpa_supplicant and hostpad packages fix security vulnerability:

A vulnerability was discovered in wpasupplicant. When Access Point (AP) mode and Protected Management Frames (PMF) (IEEE 802.11w) are enabled, wpasupplicant does not perform enough validation on the source address of some received management frames. An attacker within the 802.11 communications range could use this flaw to inject an unauthenticated frame and perform a denial-of-service attack against another device which would be disconnected from the network (CVE-2019-16275).

References
Credits

Affected packages

Mageia:7 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:rpm/mageia/wpa_supplicant?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9-1.2.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / hostapd

Package

Name
hostapd
Purl
pkg:rpm/mageia/hostapd?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9-1.1.mga7

Ecosystem specific

{
    "section": "core"
}