CVE-2019-5062

NameCVE-2019-5062
DescriptionAn exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)jessie, jessie (lts)2.3-1+deb8u15vulnerable
stretch (security)2:2.4-1+deb9u9vulnerable
stretch (lts), stretch2:2.4-1+deb9u11vulnerable
buster, buster (lts)2:2.7+git20190128+0c1e29f-6+deb10u5vulnerable
buster (security)2:2.7+git20190128+0c1e29f-6+deb10u4vulnerable
bullseye (security), bullseye2:2.9.0-21+deb11u2vulnerable
bookworm (security), bookworm2:2.10-12+deb12u2vulnerable
sid, trixie2:2.10-22vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wpasourcewheezy(unfixed)end-of-life
wpasource(unstable)(unfixed)unimportant

Notes

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850
Issue is not considered the report recieved bogus and at most with very
negligible impact. Issue likely would need to be disputed or rejected.

Search for package or bug name: Reporting problems