FEDORA-EPEL-2019-26e64681f6

security update in Fedora EPEL 7 for hostapd

Status: stable a month ago

Update to version 2.9 from upstream Security fix for CVE-2019-13377


Update to version 2.8 from upstream Security fix for [CVE-2019-11555]

Comments 10

This update has been submitted for testing by linville.

This update's test gating status has been changed to 'waiting'.

This update has obsoleted hostapd-2.8-1.el7, and has inherited its bugs and notes.

This update's test gating status has been changed to 'ignored'.

This update has been pushed to testing.

This update's test gating status has been changed to 'greenwave_failed'.

This update's test gating status has been changed to 'ignored'.

This update can be pushed to stable now if the maintainer wishes

This update has been submitted for stable by bodhi.

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
medium
Karma
0
stable threshold: 3
unstable threshold: -3
Autopush (karma)
Enabled
Autopush (time)
Enabled
Dates
submitted a month ago
in testing a month ago
in stable a month ago

Related Bugs 4

00 #1703417 CVE-2019-11555 wpa_supplicant: NULL pointer dereference due to improper fragmentation reassembly state validation in EAP-pwd implementation
00 #1712959 CVE-2019-11555 hostapd: wpa_supplicant: NULL pointer dereference due to improper fragmentation reassembly state validation in EAP-pwd implementation [epel-all]
00 #1737665 CVE-2019-13377 wpa_supplicant: Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves
00 #1737668 CVE-2019-13377 hostapd: wpa_supplicant: Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves [epel-all]

Automated Test Results