Linux repositories inspector

wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)

WPA and WPA2 are methods for securing wireless networks, the former using IEEE 802.1X, and the latter using IEEE 802.11i. This software provides key negotiation with the WPA Authenticator, and controls association with IEEE 802.11i networks.
2.7
Debian iconDebian 10.0
2.6
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 18.10
Ubuntu iconUbuntu 19.04
2.4
Debian iconDebian 9.0
Ubuntu iconUbuntu 17.10
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb2:2.7+git20190128+0c1e29f-326.03.20191.19 MiB3.27 MiB
Debian iconDebian 9.0 stretch/maindeb2:2.4-1+deb9u212.01.2019949 kiB2.47 MiB
Ubuntu iconUbuntu 17.10 artful/maindeb2.4-0ubuntu1010.11.2017882 kiB2.46 MiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb2:2.6-15ubuntu226.02.2018931 kiB2.61 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb2:2.6-15ubuntu2.210.04.2019931 kiB2.62 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb2:2.6-15ubuntu2.210.04.2019931 kiB2.62 MiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb2:2.6-18ubuntu114.01.2019934 kiB2.64 MiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb2:2.6-18ubuntu1.110.04.2019936 kiB2.64 MiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb2:2.6-18ubuntu1.110.04.2019936 kiB2.64 MiB
Ubuntu iconUbuntu 19.04 disco/maindeb2:2.6-21ubuntu227.01.2019933 kiB2.63 MiB
Ubuntu iconUbuntu 19.04 disco-proposed/maindeb2:2.6-21ubuntu310.04.2019936 kiB2.64 MiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb2.4-0ubuntu610.11.2017880 kiB2.48 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb2.4-0ubuntu6.410.04.2019881 kiB2.49 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb2.4-0ubuntu6.410.04.2019881 kiB2.49 MiB

Manual pages

wpa_supplicant.conf(5)

wpa_supplicant.conf - configuration file for wpa_supplicant

wpa_action(8)

wpa_action - wpa_cli action script

wpa_background(8)

wpa_background - Background information on Wi-Fi Protected Access and IEEE 802.11i

wpa_cli(8)

wpa_cli - WPA command line client

wpa_passphrase(8)

wpa_passphrase - Generate a WPA PSK from an ASCII passphrase for a SSID

wpa_supplicant(8)

wpa_supplicant - Wi-Fi Protected Access client and IEEE 802.1X supplicant

Latest updates

Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 2:2.6-21ubuntu3 introduced

10.04.2019 19:30
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 2:2.6-15ubuntu2.1 to 2:2.6-15ubuntu2.2

10.04.2019 14:55
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Version 2:2.6-18ubuntu1.1 introduced

10.04.2019 14:35
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 2.4-0ubuntu6.3 to 2.4-0ubuntu6.4

10.04.2019 14:35
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
  • SECURITY UPDATE: insecure os_random() fallback
    • debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN generation.
    • CVE-2016-10743
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-security/main: Version 2:2.6-18ubuntu1.1 introduced

10.04.2019 13:30
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 2:2.6-15ubuntu2.1 to 2:2.6-15ubuntu2.2

10.04.2019 13:26
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 2.4-0ubuntu6.3 to 2.4-0ubuntu6.4

10.04.2019 13:25
  • SECURITY UPDATE: Multiple security issues
    • debian/patches/VU-871675/*.patch: backported upstream patches.
    • CVE-2019-9495
    • CVE-2019-9497
    • CVE-2019-9498
    • CVE-2019-9499
  • SECURITY UPDATE: insecure os_random() fallback
    • debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN generation.
    • CVE-2016-10743
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 2:2.7+git20190128+0c1e29f-2 to 2:2.7+git20190128+0c1e29f-3

26.03.2019 23:47
  • Print the warning and exit after sourcing /lib/lsb/init-functions (Closes: #924666).
  • Recognise multiple configs in DAEMON_CONF and verify them all.
  • Fix ENGINE support with OpenSSL 1.1+ (Closes: #924632).
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 2:2.6-21 to 2:2.7+git20190128+0c1e29f-2

01.03.2019 22:18
  • Apply an RFC patch to work around big endian keyidx.
    This is likely to fix #919138, but more testing is needed.
Debian experimental icon

Debian experimental experimental/main: Version 2:2.7+git20190108+11ce7a1-2 removed

29.01.2019 16:05
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Updated from 2:2.6-21ubuntu1 to 2:2.6-21ubuntu2

27.01.2019 17:15
  • No-change rebuild for readline soname change.
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 2:2.6-21ubuntu2 removed

27.01.2019 15:05
Debian experimental icon

Debian experimental experimental/main: Updated from 2:2.7+git20190108+11ce7a1-1 to 2:2.7+git20190108+11ce7a1-2

24.01.2019 10:40
  • Disable MBO, FILS, FILS_SK_PFS, MESH, they cause failures with some drivers.
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 2:2.6-21ubuntu2 introduced

14.01.2019 17:10
  • No-change rebuild for readline soname change.
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Version 2:2.6-21ubuntu1 introduced

14.01.2019 12:56
  • Merge from Debian unstable. Remaining changes:
    • debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config will not kill off wpa and cause wireless to be unavailable on first boot.
    • debian/patches/session-ticket.patch: disable the TLS Session Ticket extension to fix auth with 802.1x PEAP on some hardware.
  • Dropped Android integration (LP: #1734568):
    • debian/patches/android_hal_fw_path_change.patch: add a DBus method for requesting a firmware change when working with the Android HAL; this is used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL being enabled.
    • debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    • debian/control: Build-Depends on android-headers to get the required wifi headers for the HAL support.
Debian experimental icon

Debian experimental experimental/main: Version 2:2.7+git20190108+11ce7a1-1 introduced

14.01.2019 03:35
  • New upstream snapshot.
  • Drop patches applied upstream.
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic/main: Version 2:2.6-18ubuntu1 introduced

14.01.2019 03:07
  • Merge from Debian unstable. Remaining changes:
    • debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config will not kill off wpa and cause wireless to be unavailable on first boot.
    • debian/patches/session-ticket.patch: disable the TLS Session Ticket extension to fix auth with 802.1x PEAP on some hardware.
    • debian/patches/android_hal_fw_path_change.patch: add a DBus method for requesting a firmware change when working with the Android HAL; this is used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL being enabled.
    • debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    • debian/control: Build-Depends on android-headers to get the required wifi headers for the HAL support.
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 2:2.6-15 to 2:2.6-21

12.01.2019 14:14
  • Fix a typo in the patch.
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 2:2.4-1+deb9u1 to 2:2.4-1+deb9u2

12.01.2019 13:50
  • SECURITY UPDATE:
    • CVE-2018-14526: Ignore unauthenticated encrypted EAPOL-Key data (Closes: #905739)
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Version 2:2.6-15ubuntu2.1 introduced

12.01.2019 13:44
  • SECURITY UPDATE: Expose sensitive information
    • debian/patches/CVE-2018-14526.patch: fix in src/rsn_supp/wpa.c.
    • CVE-2018-14526
⇧ Top