BZ#1703417 CVE-2019-11555 wpa_supplicant: NULL pointer dereference due to improper fragmentation reassembly state validation in EAP-pwd implementation
0
0
BZ#1712959 CVE-2019-11555 hostapd: wpa_supplicant: NULL pointer dereference due to improper fragmentation reassembly state validation in EAP-pwd implementation [epel-all]
0
0
BZ#1737665 CVE-2019-13377 wpa_supplicant: Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves
0
0
BZ#1737668 CVE-2019-13377 hostapd: wpa_supplicant: Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves [epel-all]
This update has been submitted for testing by linville.
This update's test gating status has been changed to 'waiting'.
This update has obsoleted hostapd-2.8-1.el7, and has inherited its bugs and notes.
This update's test gating status has been changed to 'ignored'.
This update has been pushed to testing.
This update's test gating status has been changed to 'greenwave_failed'.
This update's test gating status has been changed to 'ignored'.
This update can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by bodhi.
This update has been pushed to stable.