FEDORA-EPEL-2019-6ea040e59b

security update in Fedora EPEL 7 for hostapd

Status: testing 13 days ago

Update to version 2.7 from upstream Security fix for CVE-2019-9494 (cache attack against SAE) Security fix for CVE-2019-9495 (cache attack against EAP-pwd) Security fix for CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) Security fix for CVE-2019-9497 (EAP-pwd server not checking for reflection attack) Security fix for CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) Security fix for CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element)

How to install

sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-EPEL-2019-6ea040e59b

Comments 2

This update has been submitted for testing by linville.

This update has been pushed to testing.


Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines

Is the update generally functional? (karma)

You need to be logged in to add karma!

#1699141 CVE-2019-9494 wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake
#1699145 CVE-2019-9494 hostapd: wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake [epel-all]
#1699149 CVE-2019-9495 wpa_supplicant: EAP-pwd cache side-channel attack
#1699151 CVE-2019-9495 hostapd: wpa_supplicant: EAP-pwd cache side-channel attack [epel-all]
#1699153 CVE-2019-9496 hostapd: SAE confirm missing state validation in hostapd/AP
#1699155 CVE-2019-9496 hostapd: SAE confirm missing state validation in hostapd/AP [epel-all]
#1699164 CVE-2019-9497 wpa_supplicant: EAP-pwd server not checking for reflection attack
#1699166 CVE-2019-9497 hostapd: wpa_supplicant: EAP-pwd server not checking for reflection attack [epel-all]
Content Type
RPM
Status
testing
Test Gating
Submitted by
Update Type
security
Update Severity
high
Karma
0
stable threshold: 3
unstable threshold: -3
Autopush
Enabled
Dates
submitted 13 days ago
in testing 13 days ago
days to stable 1

Related Bugs 8

00 #1699141 CVE-2019-9494 wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake
00 #1699145 CVE-2019-9494 hostapd: wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake [epel-all]
00 #1699149 CVE-2019-9495 wpa_supplicant: EAP-pwd cache side-channel attack
00 #1699151 CVE-2019-9495 hostapd: wpa_supplicant: EAP-pwd cache side-channel attack [epel-all]
00 #1699153 CVE-2019-9496 hostapd: SAE confirm missing state validation in hostapd/AP
00 #1699155 CVE-2019-9496 hostapd: SAE confirm missing state validation in hostapd/AP [epel-all]
00 #1699164 CVE-2019-9497 wpa_supplicant: EAP-pwd server not checking for reflection attack
00 #1699166 CVE-2019-9497 hostapd: wpa_supplicant: EAP-pwd server not checking for reflection attack [epel-all]

Automated Test Results