Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.877250
Category:Fedora Local Security Checks
Title:Fedora Update for wpa_supplicant FEDORA-2019-0e0b28001d
Summary:The remote host is missing an update for the 'wpa_supplicant'; package(s) announced via the FEDORA-2019-0e0b28001d advisory.
Description:Summary:
The remote host is missing an update for the 'wpa_supplicant'
package(s) announced via the FEDORA-2019-0e0b28001d advisory.

Vulnerability Insight:
wpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with support
for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE 802.1X/WPA
component that is used in the client stations. It implements key negotiation
with a WPA Authenticator and it controls the roaming and IEEE 802.11
authentication/association of the wlan driver.

Affected Software/OS:
'wpa_supplicant' package(s) on Fedora 31.

Solution:
Please install the updated package(s).

CVSS Score:
3.3

CVSS Vector:
AV:A/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-16275
Bugtraq: 20190929 [SECURITY] [DSA 4538-1] wpa security update (Google Search)
https://seclists.org/bugtraq/2019/Sep/56
Debian Security Information: DSA-4538 (Google Search)
https://www.debian.org/security/2019/dsa-4538
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/
https://w1.fi/security/2019-7/
https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
https://www.openwall.com/lists/oss-security/2019/09/11/7
https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/12/6
https://usn.ubuntu.com/4136-1/
https://usn.ubuntu.com/4136-2/
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.