Name: | hostapd |
---|---|
Version: | 2.9 |
Release: | 5.el8 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 1323086 |
License: | BSD |
RPM: | hostapd-2.9-5.el8.x86_64.rpm |
Source RPM: | hostapd-2.9-5.el8.src.rpm |
Build Date: | Thu May 27 2021 |
Build Host: | jenkins-172-17-0-2-33bd61fe-7bdf-4b02-a42d-151dd911c48e.blddevtest1iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | http://w1.fi/hostapd |
Summary: | IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator |
Description: | hostapd is a user space daemon for access point and authentication servers. It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server. hostapd is designed to be a "daemon" program that runs in the back-ground and acts as the backend component controlling authentication. hostapd supports separate frontend programs and an example text-based frontend, hostapd_cli, is included with hostapd. |
- Enable CONFIG_OWE build option in order to provide WPA3 capability
- Fix CVE-2020-12695 (UPnP SUBSCRIBE misbehavior in hostapd WPS AP)
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
- Fix CVE-2019-16275 (AP mode PMF disconnection protection bypass)
- Update to version 2.9 from upstream
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
- Enable SAE
- Update to version 2.8 from upstream - Drop obsoleted patches
- Bump N-V-R for rebuild
- Update to version 2.7 from upstream - Remove obsolete patches for NL80211_ATTR_SMPS_MODE encoding and KRACK - Fix CVE-2019-9494 (cache attack against SAE) - Fix CVE-2019-9495 (cache attack against EAP-pwd) - Fix CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) - Fix CVE-2019-9497 (EAP-pwd server not checking for reflection attack) - Fix CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) - Fix CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element)