An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service. Reference: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850
Created hostapd tracking bugs for this issue: Affects: epel-6 [bug 1795148]