First published: Mon Jan 17 2022(Updated: )
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | <2.10 | |
W1.fi Wpa Supplicant | <2.10 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-23304.
The severity of CVE-2022-23304 is critical with a score of 9.8.
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are affected by CVE-2022-23304.
To fix CVE-2022-23304, update hostapd and wpa_supplicant to version 2.10 or later.
Yes, you can find references for CVE-2022-23304 at the following links: [Link 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPDHU5MV464CZBPX7N2SNMUYP6DFIBZL/), [Link 2](https://security.gentoo.org/glsa/202309-16), [Link 3](https://w1.fi/security/2022-1/)