Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

wpa_supplicant-gui-2.10-6.1 RPM for aarch64

From OpenSuSE Ports Tumbleweed for aarch64

Name: wpa_supplicant-gui Distribution: openSUSE Tumbleweed
Version: 2.10 Vendor: openSUSE
Release: 6.1 Build date: Fri Feb 16 22:41:11 2024
Group: Unspecified Build host: i01-armsrv3
Size: 724190 Source RPM: wpa_supplicant-2.10-6.1.src.rpm
Summary: WPA supplicant graphical front-end
This package contains a graphical front-end to wpa_supplicant, an
implementation of the WPA Supplicant component.




BSD-3-Clause AND GPL-2.0-or-later


* Thu Feb 15 2024 Clemens Famulla-Conrad <>
  - Add CVE-2023-52160.patch - Bypassing WiFi Authentication (bsc#1219975)
* Tue May 16 2023 Callum Farmer <>
  - Change ctrl_interface from /var/run to %_rundir (/run)
* Thu Sep 01 2022 Stefan Schubert <>
  - Migration to /usr/etc: Saving user changed configuration files
    in /etc and restoring them while an RPM update.
* Tue Jul 05 2022 Clemens Famulla-Conrad <>
  - Add dbus-Fix-property-DebugShowKeys-and-DebugTimestamp.patch
* Tue Jun 21 2022 Stefan Schubert <>
  - Removed %config flag for files in /usr directory.
* Tue Jun 21 2022 Stefan Schubert <>
  - Moved logrotate files from user specific directory /etc/logrotate.d
    to vendor specific directory /usr/etc/logrotate.d.
* Mon Jun 20 2022 Clemens Famulla-Conrad <>
  - Remove Revert-DBus-Add-sae-to-interface-key_mgmt-capabilities.patch
    Fixed in NetworkManager (glfo#NetworkManager/NetworkManager#a0988868).
    Wifi cards, wich do not support PMF/BIP ciphers, should not use
    SAE as key management. (bsc#1195312)
* Wed Jun 08 2022 Callum Farmer <>
  - Move the dbus-1 system.d file to /usr (bsc#1200342)
* Sat Feb 05 2022 Hans-Peter Jansen <>
  - Apply Revert-DBus-Add-sae-to-interface-key_mgmt-capabilities.patch
    to fix connect with AVM FB, if WPA3 transition mode is activated,
    e.g. Wifi -> Security: is WPA2 + WPA3, alt. switch to WPA2 (CCMP)
* Tue Feb 01 2022 Dirk Müller <>
  - drop restore-old-dbus-interface.patch, wicked has been
    switching to the new dbus interface in version 0.6.66.
  - drop wpa_supplicant-getrandom.patch : glibc has been updated
    so the getrandom() wrapper is now there
  - config:
    * enable QCA vendor extensions to nl80211
    * enable EAP-EKE
    * Support HT overrides
    * WPA3-Enterprise
    * TLS v1.1 and TLS v1.2
    * Fast Session Transfer (FST)
    * Automatic Channel Selection
    * Multi Band Operation
    * Fast Initial Link Setup
    * Mesh Networking (IEEE 802.11s)
* Mon Jan 31 2022 Dirk Müller <>
  - config:
    * Reenable Fast BSS Transition (likely fixing bsc#1195312)
    * Enable OCV, security feature that prevents MITM
      multi-channel attacks
    * Enable OWE for better hotspot support
* Sun Jan 23 2022 Dirk Müller <>
  - update to 2.10.0:
    * SAE changes
    - improved protection against side channel attacks
    - added support for the hash-to-element mechanism (sae_pwe=1 or
      sae_pwe=2); this is currently disabled by default, but will likely
      get enabled by default in the future
    - fixed PMKSA caching with OKC
    - added support for SAE-PK
    * EAP-pwd changes
    - improved protection against side channel attacks
    * fixed P2P provision discovery processing of a specially constructed
      invalid frame
    * fixed P2P group information processing of a specially constructed
      invalid frame
    * fixed PMF disconnection protection bypass in AP mode
    * added support for using OpenSSL 3.0
    * increased the maximum number of EAP message exchanges (mainly to
      support cases with very large certificates)
    * fixed various issues in experimental support for EAP-TEAP peer
    * added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)
    * a number of MKA/MACsec fixes and extensions
    * added support for SAE (WPA3-Personal) AP mode configuration
    * added P2P support for EDMG (IEEE 802.11ay) channels
    * fixed EAP-FAST peer with TLS GCM/CCM ciphers
    * improved throughput estimation and BSS selection
    * dropped support for libnl 1.1
    * added support for nl80211 control port for EAPOL frame TX/RX
    * fixed OWE key derivation with groups 20 and 21; this breaks backwards
      compatibility for these groups while the default group 19 remains
      backwards compatible
    * added support for Beacon protection
    * added support for Extended Key ID for pairwise keys
    * removed WEP support from the default build (CONFIG_WEP=y can be used
      to enable it, if really needed)
    * added a build option to remove TKIP support (CONFIG_NO_TKIP=y)
    * added support for Transition Disable mechanism to allow the AP to
      automatically disable transition mode to improve security
    * extended D-Bus interface
    * added support for PASN
    * added a file-based backend for external password storage to allow
      secret information to be moved away from the main configuration file
      without requiring external tools
    * added EAP-TLS peer support for TLS 1.3 (disabled by default for now)
    * added support for SCS, MSCS, DSCP policy
    * changed driver interface selection to default to automatic fallback
      to other compiled in options
    * a large number of other fixes, cleanup, and extensions
  - drop wpa_supplicant-p2p_iname_size.diff, CVE-2021-30004.patch,
      CVE-2021-27803.patch, CVE-2021-0326.patch, CVE-2019-16275.patch:
  - refresh config from 2.10 defconfig, re-enable CONFIG_WEP
* Mon Jan 10 2022 Johannes Segitz <>
  - Added hardening to systemd service(s) (bsc#1181400). Modified:
    * wpa_supplicant.service
* Tue Apr 06 2021 Clemens Famulla-Conrad <>
  - Add CVE-2021-30004.patch -- forging attacks may occur because
    AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c
* Wed Mar 03 2021 Clemens Famulla-Conrad <>
  - Fix systemd device ready dependencies in wpa_supplicant@.service file.
* Sat Feb 27 2021 Clemens Famulla-Conrad <>
  - Add CVE-2021-27803.patch -- P2P provision discovery processing vulnerability
* Thu Feb 04 2021 Clemens Famulla-Conrad <>
  - Add CVE-2021-0326.patch -- P2P group information processing vulnerability



Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 10:53:35 2024