| Summary: | wpa_supplicant new side-channel attack security issue (upstream 2022-1, CVE-2022-23303) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | wpa_supplicant-2.9-8.2.mga8.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2022-01-17 17:33:31 CET
David Walser
2022-01-17 17:33:43 CET
Status comment:
(none) =>
Fixed upstream in 2.10 This is one of those homeless pkgs variously maintained, so no choice but to assign this update globally. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated packages fix a security vulnerability: New side-channel attack security issue. (upstream 2022-1) References: https://w1.fi/security/2022-1/sae-eap-pwd-side-channel-attack-update-2.txt ======================== Updated packages in core/updates_testing: ======================== wpa_supplicant-gui-2.9-8.3.mga8 wpa_supplicant-2.9-8.3.mga8 from SRPM: wpa_supplicant-2.9-8.3.mga8.src.rpm CC:
(none) =>
nicolas.salguero MGA8-64 Plasma on Lenovo B50 in Dutch No installation issues. Rebooted and wifi comes up OK. Somethinng struck me as a bit strange: the package has the gui (wpa_gui command) in /usr/bin, so accessible to a normal user. But when you run itas a normal user, all fiels (adapter, network...) are blank, and you cann't do absolutely nothing with it. Running the command as root is fine. But in all OK for me. CC:
(none) =>
herman.viaene That does seem odd, but sounds as if it were somehow by design. Validating. Advisory in Comment 2. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Dave Hodgins
2022-01-18 19:21:07 CET
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0025.html Status:
ASSIGNED =>
RESOLVED This is CVE-2022-23303: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/5F6SN2YLMKFIXVA2MABEIB6WB5PLHRTF/ Summary:
wpa_supplicant new side-channel attack security issue (upstream 2022-1) =>
wpa_supplicant new side-channel attack security issue (upstream 2022-1, CVE-2022-23303) |