Back to bug 2044602
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2022-01-24 19:54:08 UTC | Depends On | 2044604, 2044603 | |
| Pedro Sampaio | 2022-01-24 19:54:48 UTC | Blocks | 2044605 | |
| Istiak Ferdous | 2022-01-25 19:24:58 UTC | CC | hello | |
| Davide Caratti | 2022-01-26 21:22:25 UTC | Depends On | 2041269 | |
| Davide Caratti | 2022-02-10 16:24:44 UTC | Doc Text | The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. The highest threat from this vulnerability is to availability | |
| Doc Text | , confidentiality and integrity. | |||
| Fixed In Version | wpa_supplicant 2.10 | |||
| Depends On | 2052326, 2052327, 2052328 | |||
| Depends On | 2042540 | |||
| Simone Caronni | 2023-05-26 06:51:31 UTC | CC | negativo17 | |
| Red Hat Bugzilla | 2023-07-07 08:30:32 UTC | Assignee | security-response-team | nobody |
Back to bug 2044602