FEDORA-EPEL-2019-6ea040e59b created by linville a year ago for Fedora EPEL 7
stable

Update to version 2.7 from upstream Security fix for CVE-2019-9494 (cache attack against SAE) Security fix for CVE-2019-9495 (cache attack against EAP-pwd) Security fix for CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) Security fix for CVE-2019-9497 (EAP-pwd server not checking for reflection attack) Security fix for CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) Security fix for CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element)

This update has been submitted for testing by linville.

a year ago

This update has been pushed to testing.

a year ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

a year ago

This update has been submitted for batched by linville.

a year ago

This update has been submitted for stable by bodhi.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
BZ#1699141 CVE-2019-9494 wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake
0
0
BZ#1699145 CVE-2019-9494 hostapd: wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake [epel-all]
0
0
BZ#1699149 CVE-2019-9495 wpa_supplicant: EAP-pwd cache side-channel attack
0
0
BZ#1699151 CVE-2019-9495 hostapd: wpa_supplicant: EAP-pwd cache side-channel attack [epel-all]
0
0
BZ#1699153 CVE-2019-9496 hostapd: SAE confirm missing state validation in hostapd/AP
0
0
BZ#1699155 CVE-2019-9496 hostapd: SAE confirm missing state validation in hostapd/AP [epel-all]
0
0
BZ#1699164 CVE-2019-9497 wpa_supplicant: EAP-pwd server not checking for reflection attack
0
0
BZ#1699166 CVE-2019-9497 hostapd: wpa_supplicant: EAP-pwd server not checking for reflection attack [epel-all]
0
0

Automated Test Results