Mageia 2024-0053: wpa_supplicant security update
Summary
The updated packages fix a security vulnerability:
The implementation of PEAP in wpa_supplicant through 2.10 allows
authentication bypass. For a successful attack, wpa_supplicant must be
configured to not verify the network's TLS certificate during Phase 1
authentication, and an eap_peap_decrypt vulnerability can then be abused
to skip Phase 2 authentication. The attack vector is sending an EAP-TLV
Success packet instead of starting Phase 2. This allows an adversary to
impersonate Enterprise Wi-Fi networks.
(CVE-2023-52160)
References
- https://bugs.mageia.org/show_bug.cgi?id=32911
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/
- https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.383534
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160
Resolution
MGASA-2024-0053 - Updated wpa_supplicant packages fix security vulnerabilities
SRPMS
- 9/core/wpa_supplicant-2.10-3.1.mga9