Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.877188
Category:Fedora Local Security Checks
Title:Fedora Update for hostapd FEDORA-2019-740834c559
Summary:The remote host is missing an update for the 'hostapd'; package(s) announced via the FEDORA-2019-740834c559 advisory.
Description:Summary:
The remote host is missing an update for the 'hostapd'
package(s) announced via the FEDORA-2019-740834c559 advisory.

Vulnerability Insight:
hostapd is a user space daemon for access point and authentication servers. It
implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP
Authenticators and RADIUS authentication server.

hostapd is designed to be a 'daemon' program that runs in the back-ground and
acts as the backend component controlling authentication. hostapd supports
separate frontend programs and an example text-based frontend, hostapd_cli, is
included with hostapd.

Affected Software/OS:
'hostapd' package(s) on Fedora 31.

Solution:
Please install the updated package(s).

CVSS Score:
3.3

CVSS Vector:
AV:A/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-16275
Bugtraq: 20190929 [SECURITY] [DSA 4538-1] wpa security update (Google Search)
https://seclists.org/bugtraq/2019/Sep/56
Debian Security Information: DSA-4538 (Google Search)
https://www.debian.org/security/2019/dsa-4538
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/
https://w1.fi/security/2019-7/
https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
https://www.openwall.com/lists/oss-security/2019/09/11/7
https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/12/6
https://usn.ubuntu.com/4136-1/
https://usn.ubuntu.com/4136-2/
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.