ELA-1419-1 wpa security update

multiple vulnerabilities

2025-05-11
Packagewpa
Version2:2.9.0-21+deb11u3~deb10u1 (buster)
Related CVEs CVE-2022-23303 CVE-2022-23304 CVE-2022-37660


Multiple vulnerabilities were found in wpa, a set of tools including the widely-used wpasupplicant client for authenticating with WPA and WPA2 wireless networks.

CVE-2022-23303

The implementations of SAE in hostapd
are vulnerable to side channel attacks as a result of
cache access patterns.

CVE-2022-23304

The implementations of EAP-pwd are vulnerable
to side-channel attacks as a result of cache access patterns.

CVE-2022-37660

The PKEX code remains active even after
a successful PKEX association. An attacker that successfully
bootstrapped public keys with another entity using PKEX in
the past, will be able to subvert a future bootstrapping
by passively observing public keys.


For Debian 10 buster, these problems have been fixed in version 2:2.9.0-21+deb11u3~deb10u1.

We recommend that you upgrade your wpa packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.