FEDORA-EPEL-2019-26e64681f6 created by linville 3 months ago for Fedora EPEL 7
stable

Update to version 2.9 from upstream Security fix for CVE-2019-13377


Update to version 2.8 from upstream Security fix for [CVE-2019-11555]

This update has been submitted for testing by linville. 3 months ago
This update's test gating status has been changed to 'waiting'. 3 months ago
This update has obsoleted [hostapd-2.8-1.el7](https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-fc63c75ab1), and has inherited its bugs and notes. 3 months ago
This update's test gating status has been changed to 'ignored'. 3 months ago
This update has been pushed to testing. 3 months ago
This update's test gating status has been changed to 'greenwave_failed'. 3 months ago
This update's test gating status has been changed to 'ignored'. 3 months ago
This update can be pushed to stable now if the maintainer wishes 3 months ago
This update has been submitted for stable by bodhi. 3 months ago
This update has been pushed to stable. 3 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
3 months ago
in testing
3 months ago
in stable
3 months ago
BZ#1703417 CVE-2019-11555 wpa_supplicant: NULL pointer dereference due to improper fragmentation reassembly state validation in EAP-pwd implementation
0
0
BZ#1712959 CVE-2019-11555 hostapd: wpa_supplicant: NULL pointer dereference due to improper fragmentation reassembly state validation in EAP-pwd implementation [epel-all]
0
0
BZ#1737665 CVE-2019-13377 wpa_supplicant: Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves
0
0
BZ#1737668 CVE-2019-13377 hostapd: wpa_supplicant: Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves [epel-all]
0
0

Automated Test Results