Name: | hostapd |
---|---|
Version: | 2.9 |
Release: | 4.el8 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 1376782 |
License: | BSD |
RPM: | hostapd-2.9-4.el8.aarch64.rpm |
Source RPM: | hostapd-2.9-4.el8.src.rpm |
Build Date: | Fri Jul 10 2020 |
Build Host: | ca-buildarm05 |
Vendor: | Oracle America |
URL: | http://w1.fi/hostapd |
Summary: | IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator |
Description: | hostapd is a user space daemon for access point and authentication servers. It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server. hostapd is designed to be a "daemon" program that runs in the back-ground and acts as the backend component controlling authentication. hostapd supports separate frontend programs and an example text-based frontend, hostapd_cli, is included with hostapd. |
- Fix CVE-2020-12695 (UPnP SUBSCRIBE misbehavior in hostapd WPS AP)
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
- Fix CVE-2019-16275 (AP mode PMF disconnection protection bypass)
- Update to version 2.9 from upstream
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
- Enable SAE
- Update to version 2.8 from upstream - Drop obsoleted patches
- Bump N-V-R for rebuild
- Update to version 2.7 from upstream - Remove obsolete patches for NL80211_ATTR_SMPS_MODE encoding and KRACK - Fix CVE-2019-9494 (cache attack against SAE) - Fix CVE-2019-9495 (cache attack against EAP-pwd) - Fix CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) - Fix CVE-2019-9497 (EAP-pwd server not checking for reflection attack) - Fix CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) - Fix CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element)
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild