Bug 2042104
Summary: | Update wpa_supplicant to version 2.10 | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Davide Caratti <dcaratti> | |
Component: | wpa_supplicant | Assignee: | Davide Caratti <dcaratti> | |
Status: | CLOSED ERRATA | QA Contact: | Ken Benoit <kbenoit> | |
Severity: | medium | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 8.6 | CC: | rvr, sukulkar | |
Target Milestone: | rc | Keywords: | Rebase, Triaged | |
Target Release: | --- | |||
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | wpa_supplicant-2.10-1.el8 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 2042540 (view as bug list) | Environment: | ||
Last Closed: | 2022-05-10 15:24:41 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2042540 |
Description
Davide Caratti
2022-01-18 20:04:36 UTC
@kbenoit: one of the most significative differences with the snapshot release is [1], that should allow using legacy cryptographic function without explicitly loading the legacy provider in openssl.cnf [1] https://w1.fi/cgit/hostap/commit/?id=ff2eccbdf9541fc3491e8a5a302eb661208bb827 Providing an ack, but keep in mind that this is coming in very close to the line so in the best of circumstances for testing this is going to get verified right before the cutoff where blockers or exceptions are required. Ran automated wireless regression testing against RHEL-8.6.0-20220210.3 and wpa_supplicant-2.10-1.el8 installed. Testing passed without issue. Marking as Verified:Tested and SanityOnly. Ran automated wireless regression testing against RHEL-8.6.0-20220215.2 (wpa_supplicant-2.10-1.el8) against a variety of hardware. Testing passed without issue. Verifying as SanityOnly. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (wpa_supplicant bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:2062 |