An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
| Software | From | Fixed in |
|---|---|---|
| w1.fi / hostapd | - | 2.7.x |
| w1.fi / wpa_supplicant | - | 2.7.x |
| fedoraproject / fedora | 28 | 28.x |
| fedoraproject / fedora | 29 | 29.x |
| fedoraproject / fedora | 30 | 30.x |