Jump to letter: [
          
            3ABCDEFGHIJKLMNOPQRSTUVWXYZ
          ]
        
        wpa_supplicant - WPA/WPA2/IEEE 802.1X Supplicant
        
        
        - Description:
 
        wpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with support
for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE 802.1X/WPA
component that is used in the client stations. It implements key negotiation
with a WPA Authenticator and it controls the roaming and IEEE 802.11
authentication/association of the wlan driver.
 
        
        Packages
        
        
            | wpa_supplicant-2.6-12.el7_9.2.x86_64
              [1.0 MiB] | 
            
              Changelog
              by Davide Caratti (2021-03-08):
              - P2P: Fix a corner case in peer addition based on PD Request (CVE-2021-27803) 
             | 
        
            | wpa_supplicant-2.6-12.el7.x86_64
              [1.0 MiB] | 
            
              Changelog
              by Davide Caratti (2018-08-28):
              - Ignore unauthenticated encrypted EAPOL-Key data (CVE-2018-14526) 
             | 
        
            | wpa_supplicant-2.6-5.el7_4.1.x86_64
              [1.2 MiB] | 
            
              Changelog
              by Davide Caratti (2017-10-13):
              - avoid key reinstallation (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086,
  CVE-2017-13087, CVE-2017-13088) 
             | 
        
            | wpa_supplicant-2.0-17.el7_1.x86_64
              [802 KiB] | 
            
              Changelog
              by Scientific Linux Auto Patch Process (2015-06-11):
              - Eliminated rpmbuild "bogus date" error due to inconsistent weekday,
  by assuming the date is correct and changing the weekday. 
             | 
        
            | wpa_supplicant-2.0-13.el7_0.x86_64
              [800 KiB] | 
            
              Changelog
              by Dan Williams (2014-10-22):
              - Use os_exec() for action script execution (CVE-2014-3686) 
             |