Fri, 13 Dec 2024 22:12:51 UTC | login

Information for build wpa_supplicant-2.8-3.fc31

ID119524
Package Namewpa_supplicant
Version2.8
Release3.fc31
Epoch1
Sourcegit+https://src.fedoraproject.org/rpms/wpa_supplicant.git#d6bd533fa7d9d9130e89d5c2aff5b2e6cdd1f001
SummaryWPA/WPA2/IEEE 802.1X Supplicant
Descriptionwpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with support for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/association of the wlan driver.
Built bydavidlt
State complete
Volume DEFAULT
StartedSun, 04 Aug 2019 05:34:32 UTC
CompletedSun, 04 Aug 2019 06:08:57 UTC
Taskbuild (f31-candidate, /rpms/wpa_supplicant.git:d6bd533fa7d9d9130e89d5c2aff5b2e6cdd1f001)
Extra{'source': {'original_url': 'git+https://src.fedoraproject.org/rpms/wpa_supplicant.git#d6bd533fa7d9d9130e89d5c2aff5b2e6cdd1f001'}}
Tags
f31
RPMs
src
wpa_supplicant-2.8-3.fc31.src.rpm (info) (download)
riscv64
wpa_supplicant-2.8-3.fc31.riscv64.rpm (info) (download)
wpa_supplicant-gui-2.8-3.fc31.riscv64.rpm (info) (download)
wpa_supplicant-debuginfo-2.8-3.fc31.riscv64.rpm (info) (download)
wpa_supplicant-debugsource-2.8-3.fc31.riscv64.rpm (info) (download)
wpa_supplicant-gui-debuginfo-2.8-3.fc31.riscv64.rpm (info) (download)
Logs
riscv64
build.log
hw_info.log
mock_output.log
root.log
state.log
Changelog * Sat Jul 27 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.8-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Fri May 10 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.8-2 - fix changelog for version 2.8-1 * Thu May 02 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.8-1 - Update to 2.8 upstream release, to include latest fix for NULL pointer dereference when EAP-PWD peer receives unexpected EAP fragments (CVE-2019-11555, rh #1701759) * Fri Apr 12 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.7-5 - fix SAE and EAP_PWD vulnerabilities: CVE-2019-9494 (cache attack against SAE) CVE-2019-9495 (cache attack against EAP-pwd) CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) CVE-2019-9497 (EAP-pwd server not checking for reflection attack) CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element) * Sun Feb 03 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.7-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Mon Jan 21 2019 Lubomir Rintel <lkundrak@v3.sk> - 1:2.7-3 - Enable OWE and DPP - Expose SAE support on D-Bus * Mon Jan 21 2019 Lubomir Rintel <lkundrak@v3.sk> - 1:2.7-2 - Enable MESH & SAE * Tue Dec 18 2018 Lubomir Rintel <lkundrak@v3.sk> - 1:2.7-1 - Update to 2.7 upstream release * Wed Aug 15 2018 Lubomir Rintel <lkundrak@v3.sk> - 1:2.6-20 - Expose availability of SHA384 and FT on D-Bus * Wed Aug 15 2018 Lubomir Rintel <lkundrak@v3.sk> - 1:2.6-19 - Drop the broken Pmf D-Bus property patch * Wed Aug 08 2018 Davide Caratti <dcaratti@redhat.com> - 1:2.6-18 - Ignore unauthenticated encrypted EAPOL-Key data (CVE-2018-14526) * Sat Jul 14 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.6-17 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild * Fri Jun 22 2018 Davide Caratti <dcaratti@redhat.com> - 1:2.6-16 - Fix endoding of NL80211_ATTR_SMPS_MODE (rh#1570903) * Fri May 11 2018 Davide Caratti <dcaratti@redhat.com> - 1:2.6-15 - Make PMF configurable using D-Bus (rh#1567474) * Fri Feb 09 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.6-14 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild * Tue Jan 16 2018 Davide Caratti <dcaratti@redhat.com> - 1:2.6-13 - Don't restart wpa_supplicant.service on package upgrade (rh#1535233) * Wed Nov 01 2017 Jiří Klimeš <blueowl@centrum.cz> - 1:2.6-12 - Fix crash when using MACsec without loaded macsec.ko (rh #1497640) - Enable Fast BSS Transition for station mode (rh #1372928) * Mon Oct 16 2017 Lubomir Rintel <lkundrak@v3.sk> - 1:2.6-11 - hostapd: Avoid key reinstallation in FT handshake (CVE-2017-13082) - Fix PTK rekeying to generate a new ANonce - Prevent reinstallation of an already in-use group key and extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases (CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088) - Prevent installation of an all-zero TK - TDLS: Reject TPK-TK reconfiguration - WNM: Ignore WNM-Sleep Mode Response without pending request - FT: Do not allow multiple Reassociation Response frames