Package wpa_supplicant: Information

    Source package: wpa_supplicant
    Version: 2.1-alt0.M70P.3
    Build time:  May 15, 2015, 09:49 AM in the task #144392
    Report package bug
    License: BSD
    Summary: wpa_supplicant is an implementation of the WPA Supplicant component
    Description: 
    wpa_supplicant is an implementation of the WPA Supplicant component,
    i.e., the part that runs in the client stations. It implements WPA key
    negotiation with a WPA Authenticator and EAP authentication with
    Authentication Server. In addition, it controls the roaming and IEEE
    802.11 authentication/association of the wlan driver.
    
    wpa_supplicant is designed to be a "daemon" program that runs in the
    background and acts as the backend component controlling the wireless
    connection. wpa_supplicant supports separate frontend programs and an
    example text-based frontend, wpa_cli, is included with wpa_supplicant.

    List of rpms provided by this srpm:
    wpa_gui (x86_64, i586)
    wpa_gui-debuginfo (x86_64, i586)
    wpa_supplicant (x86_64, i586)
    wpa_supplicant-debuginfo (x86_64, i586)

    Maintainer: Mikhail Efremov


    ACL:
    @qa_p7

      1. libxml2-devel
      2. libssl-devel
      3. libncurses-devel
      4. libnl-devel >= 3.2.21
      5. docbook-utils
      6. inkscape
      7. libpcsclite-devel
      8. gcc-c++
      9. libdbus-devel
      10. libqt4-devel
      11. libreadline-devel

    Last changed


    May 14, 2015 Mikhail Efremov 2.1-alt0.M70P.3
    - Patches from upstream (backport from 2.4-alt3):
        + EAP-pwd peer: Fix asymmetric fragmentation behavior.
        + EAP-pwd server: Fix Total-Length parsing for fragment reassembly.
        + EAP-pwd peer: Fix Total-Length parsing for fragment reassembly.
        + EAP-pwd: Add explicit total length limit.
        + EAP-pwd server: Fix payload length validation for Commit and
          Confirm.
        + EAP-pwd peer: Fix payload length validation for Commit and
          Confirm.
    April 27, 2015 Mikhail Efremov 2.1-alt0.M70P.2
    - Patch from upstream (CVE-2015-1863):
        + P2P: Validate SSID element length before copying it.
    Feb. 6, 2014 Andrey Cherepanov 2.1-alt0.M70P.1
    - Backport new version to p7 branch