wpa_supplicant is vulnerable to denial of service. The vulnerability exists as it allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
www.openwall.com/lists/oss-security/2019/09/12/6
lists.debian.org/debian-lts-announce/2019/09/msg00017.html
lists.fedoraproject.org/archives/list/[email protected]/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/
lists.fedoraproject.org/archives/list/[email protected]/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/
lists.fedoraproject.org/archives/list/[email protected]/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/
lists.fedoraproject.org/archives/list/[email protected]/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/
lists.fedoraproject.org/archives/list/[email protected]/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/
seclists.org/bugtraq/2019/Sep/56
usn.ubuntu.com/4136-1/
usn.ubuntu.com/4136-2/
w1.fi/security/2019-7/
w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
www.debian.org/security/2019/dsa-4538
www.openwall.com/lists/oss-security/2019/09/11/7