CVE-2022-23303

Name
CVE-2022-23303
Description
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://w1.fi/security/2022-1/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPDHU5MV464CZBPX7N2SNMUYP6DFIBZL/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* hostapd >= None < 2.10
cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* wpa_supplicant >= None < 2.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
wpa_supplicant 3.15-main 2.9-r17 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
wpa_supplicant 3.14-main 2.9-r14 Natanael Copa <ncopa@alpinelinux.org> fixed
wpa_supplicant 3.13-main 2.9-r11 Natanael Copa <ncopa@alpinelinux.org> fixed
wpa_supplicant 3.12-main 2.9-r8 Natanael Copa <ncopa@alpinelinux.org> fixed
hostapd 3.15-main 2.10-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
hostapd 3.14-main 2.9-r4 Natanael Copa <ncopa@alpinelinux.org> fixed
hostapd 3.13-main 2.9-r4 Natanael Copa <ncopa@alpinelinux.org> fixed
hostapd 3.12-main 2.9-r4 Natanael Copa <ncopa@alpinelinux.org> fixed