Back to bug 2044599
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2022-01-24 19:52:12 UTC | Depends On | 2044600, 2044601 | |
| Pedro Sampaio | 2022-01-24 19:54:48 UTC | Blocks | 2044605 | |
| Istiak Ferdous | 2022-01-25 19:24:12 UTC | CC | hello | |
| Davide Caratti | 2022-02-11 13:56:27 UTC | Doc Text | The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. The highest threat from this vulnerability is to availability | |
| Doc Text | , confidentiality and integrity. | |||
| Depends On | 2052325, 2052324, 2052323 | |||
| Fixed In Version | wpa_supplicant 2.10 | |||
| Depends On | 2044603 | |||
| Davide Caratti | 2022-02-11 14:07:53 UTC | Depends On | 2052328 | |
| Simone Caronni | 2023-05-26 06:51:31 UTC | CC | negativo17 | |
| Red Hat Bugzilla | 2023-07-07 08:29:58 UTC | Assignee | security-response-team | nobody |
Back to bug 2044599