Back to bug 2044599

Who When What Removed Added
Pedro Sampaio 2022-01-24 19:52:12 UTC Depends On 2044600, 2044601
Pedro Sampaio 2022-01-24 19:54:48 UTC Blocks 2044605
Istiak Ferdous 2022-01-25 19:24:12 UTC CC hello
Davide Caratti 2022-02-11 13:56:27 UTC Doc Text The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. The highest threat from this vulnerability is to availability
Doc Text , confidentiality and integrity.
Depends On 2052325, 2052324, 2052323
Fixed In Version wpa_supplicant 2.10
Depends On 2044603
Davide Caratti 2022-02-11 14:07:53 UTC Depends On 2052328
Simone Caronni 2023-05-26 06:51:31 UTC CC negativo17
Red Hat Bugzilla 2023-07-07 08:29:58 UTC Assignee security-response-team nobody

Back to bug 2044599