Fri, 19 Apr 2024 14:22:00 UTC | login

Information for build wpa_supplicant-2.9-6.fc33

ID183410
Package Namewpa_supplicant
Version2.9
Release6.fc33
Epoch1
Sourcegit+https://src.fedoraproject.org/rpms/wpa_supplicant.git#1ffda691c823c9a62d17671dbea9182bd2ebdc5a
SummaryWPA/WPA2/IEEE 802.1X Supplicant
Descriptionwpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with support for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/association of the wlan driver.
Built bydavidlt
State complete
Volume DEFAULT
StartedSat, 15 Aug 2020 02:13:21 UTC
CompletedSat, 15 Aug 2020 03:43:02 UTC
Taskbuild (f33, /rpms/wpa_supplicant.git:1ffda691c823c9a62d17671dbea9182bd2ebdc5a)
Extra{'source': {'original_url': 'git+https://src.fedoraproject.org/rpms/wpa_supplicant.git#1ffda691c823c9a62d17671dbea9182bd2ebdc5a'}}
Tags
f33
RPMs
src
wpa_supplicant-2.9-6.fc33.src.rpm (info) (download)
riscv64
wpa_supplicant-2.9-6.fc33.riscv64.rpm (info) (download)
wpa_supplicant-gui-2.9-6.fc33.riscv64.rpm (info) (download)
wpa_supplicant-debuginfo-2.9-6.fc33.riscv64.rpm (info) (download)
wpa_supplicant-debugsource-2.9-6.fc33.riscv64.rpm (info) (download)
wpa_supplicant-gui-debuginfo-2.9-6.fc33.riscv64.rpm (info) (download)
Logs
riscv64
build.log
hw_info.log
mock_output.log
root.log
state.log
Changelog * Wed Jul 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.9-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Mon Jun 15 2020 Benjamin Berg <bberg@redhat.com> - 1:2.9-5 - fix some issues with P2P operation * Thu Apr 23 2020 Davide Caratti <dcaratti@redhat.com> - 1:2.9-4 - Enable Tunneled Direct Link Setup (TDLS) * Fri Jan 31 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.9-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Wed Oct 30 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.9-2 - fix AP mode PMF disconnection protection bypass (CVE-2019-16275, rh #1767026) * Fri Aug 16 2019 Lubomir Rintel <lkundrak@v3.sk> - 1:2.9-1 - Update to version 2.9 * Sat Jul 27 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.8-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Fri May 10 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.8-2 - fix changelog for version 2.8-1 * Thu May 02 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.8-1 - Update to 2.8 upstream release, to include latest fix for NULL pointer dereference when EAP-PWD peer receives unexpected EAP fragments (CVE-2019-11555, rh #1701759) * Fri Apr 12 2019 Davide Caratti <dcaratti@redhat.com> - 1:2.7-5 - fix SAE and EAP_PWD vulnerabilities: CVE-2019-9494 (cache attack against SAE) CVE-2019-9495 (cache attack against EAP-pwd) CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) CVE-2019-9497 (EAP-pwd server not checking for reflection attack) CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element) * Sun Feb 03 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:2.7-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Mon Jan 21 2019 Lubomir Rintel <lkundrak@v3.sk> - 1:2.7-3 - Enable OWE and DPP - Expose SAE support on D-Bus * Mon Jan 21 2019 Lubomir Rintel <lkundrak@v3.sk> - 1:2.7-2 - Enable MESH & SAE * Tue Dec 18 2018 Lubomir Rintel <lkundrak@v3.sk> - 1:2.7-1 - Update to 2.7 upstream release