wpa 2:2.7+git20190128+0c1e29f-6+deb10u1 source package in Debian
Changelog
wpa (2:2.7+git20190128+0c1e29f-6+deb10u1) buster-security; urgency=medium * SECURITY UPDATE: - AP mode PMF disconnection protection bypass. More details: + https://w1.fi/security/2019-7/ Closes: #940080 (CVE-2019-16275) - Timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves. More details: + https://w1.fi/security/2019-6/ + https://wpa3.mathyvanhoef.com/ Closes: #934180 (CVE-2019-13377) -- Andrej Shadura <email address hidden> Tue, 17 Sep 2019 11:58:08 +0200
Upload details
- Uploaded by:
- Debian wpasupplicant Maintainers
- Uploaded to:
- Buster
- Original maintainer:
- Debian wpasupplicant Maintainers
- Architectures:
- linux-any kfreebsd-any
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
wpa_2.7+git20190128+0c1e29f-6+deb10u1.dsc | 2.2 KiB | dfa899eb6942b76578c551a61f65ec53a539349989716b72aabf7eeabe0fe379 |
wpa_2.7+git20190128+0c1e29f.orig.tar.xz | 2.2 MiB | 4732f6dc4f2402347a37adea7f127ffce88ae3b27afc816b67f5b51199bd139e |
wpa_2.7+git20190128+0c1e29f-6+deb10u1.debian.tar.xz | 103.3 KiB | 7dd463a6c56dc3461f314543b8078e1d5a0c1a6313c02d6f0f8d8fe2e1f45d89 |
No changes file available.