IPv6 logo

You are connected to Repology using legacy IPv4 protocol. Due to IPv4 address exhaustion it may become too expensive or impossible for Repology to support IPv4 in the nearest future. Time to switch to IPv6!

Versions Packages Information History CVEs Related Badges Report

Versions for wpa-supplicant

321 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
wpa_supplicant-doc 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_gui 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant-dbus 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant-dbg 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant-openrc 2.9 Potentially vulnerable - awilfox@adelielinux.org
AlmaLinux 8
BaseOS
wpa_supplicant 2.10 System Environment/Base packager@almalinux.org
AlmaLinux 9
BaseOS
wpa_supplicant 2.10 Unspecified packager@almalinux.org
Alpine Linux 3.8
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
wpa_supplicant 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
wpa_supplicant-doc 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
wpa_supplicant-openrc 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
wpa_supplicant-doc 2.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
wpa_supplicant 2.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
wpa_supplicant-openrc 2.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
wpa_supplicant-doc 2.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
wpa_supplicant 2.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
wpa_supplicant-openrc 2.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
wpa_gui 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
wpa_gui 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
wpa_gui 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
wpa_supplicant-openrc 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
wpa_supplicant-doc 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
wpa_supplicant 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
wpa_supplicant-openrc 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
wpa_supplicant-doc 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
wpa_supplicant 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.17
community
wpa_gui 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.18
community
wpa_gui 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
wpa_supplicant 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
wpa_supplicant-doc 2.10 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
wpa_supplicant-openrc 2.10 - ncopa@alpinelinux.org
Alpine Linux Edge
community
wpa_gui 2.10 - ncopa@alpinelinux.org
Alpine Linux Edge
main
wpa_supplicant 2.10 - ncopa@alpinelinux.org
Alpine Linux Edge
main
wpa_supplicant-doc 2.10 - ncopa@alpinelinux.org
Alpine Linux Edge
main
wpa_supplicant-openrc 2.10 - ncopa@alpinelinux.org
ALT Linux p9 wpa_supplicant 2.9 Potentially vulnerable Security/Networking sbolshakov@altlinux.org
ALT Linux p10 wpa_supplicant 2.10 Security/Networking sbolshakov@altlinux.org
ALT Sisyphus wpa_supplicant 2.10 Security/Networking sbolshakov@altlinux.org
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
antiX-17
nosystemd
wpa 2.4 Potentially vulnerable nosystemd pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
AOSC wpa-supplicant 2.10 net fallback-mnt-aosc@repology
Apertis v2020
v2020/target
wpa 2.7+git20190128+0c1e29f Potentially vulnerable main wpa@packages.debian.org, andrewsh@debian.org
Apertis v2020
v2020-updates/target
wpa 2.7+git20190128+0c1e29f Potentially vulnerable main wpa@packages.debian.org, andrewsh@debian.org
Apertis v2021
v2021/target
wpa 2.7+git20190128+0c1e29f Potentially vulnerable main wpa@packages.debian.org, andrewsh@debian.org
Apertis v2022
v2022/target
wpa 2.9.0 Potentially vulnerable main wpa@packages.debian.org, andrewsh@debian.org
Apertis v2023
v2023/target
wpa 2.9.0 Potentially vulnerable - wpa@packages.debian.org, andrewsh@debian.org
Apertis v2024 Development
v2024dev1/target
wpa 2.9.0 Potentially vulnerable - wpa@packages.debian.org, andrewsh@debian.org
Arch
core
wpa_supplicant 2.10 - -
Arch Linux 32 i486
core
wpa_supplicant 2.10 - -
Arch Linux 32 i686
core
wpa_supplicant 2.10 - -
Arch Linux 32 pentium4
core
wpa_supplicant 2.10 - -
Arch Linux ARM aarch64
core
wpa_supplicant 2.10 - -
Arch Linux ARM aarch64
core
wpa_supplicant-debug 2.10 - -
Arch Linux ARM armv7h
core
wpa_supplicant 2.10 - -
Arch Linux ARM armv7h
core
wpa_supplicant-debug 2.10 - -
ArchPOWER powerpc wpa_supplicant 2.10 - -
ArchPOWER powerpc64le wpa_supplicant 2.10 - -
ArchPOWER riscv64 wpa_supplicant 2.10 - -
AUR wpa_supplicant-git 2.10.r1120.gcc8a09a48 - chocobo1@aur
AUR wpa_supplicant_gui 2.10 - sandboiii@aur
Artix
system
wpa_supplicant 2.10 - -
Ataraxia GNU/Linux wpa_supplicant 2.9 Potentially vulnerable net nagakamira@gmail.com
Carbs Linux
extra
wpa_supplicant 2.10 - cem@carbslinux.org
CentOS 6
os
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base -
CentOS 7
os
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
CentOS 7
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
CentOS 8
BaseOS
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
wpa_supplicant 2.10 System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base bugs@centos.org
CentOS Stream 8
BaseOS
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base bugs@centos.org
CentOS Stream 9
BaseOS
wpa_supplicant 2.10 Unspecified builder@centos.org
CentOS Stream 9
BaseOS
wpa_supplicant 2.10 Unspecified builder@centos.org
CentOS Stream 9
BaseOS
wpa_supplicant 2.10 Unspecified builder@centos.org
CentOS Stream 9
BaseOS
wpa_supplicant 2.9 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
wpa_supplicant 2.9 Potentially vulnerable Unspecified builder@centos.org
CRUX 3.4
opt
wpa_supplicant 2.8 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
wpa_supplicant 2.9 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
wpa_supplicant 2.10 - jue@crux.nu
CRUX 3.7
opt
wpa_supplicant 2.10 - jue@crux.nu
Debian 10
buster/main
wpa 2.7+git20190128+0c1e29f Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian 10
buster/updates/main
wpa 2.7+git20190128+0c1e29f Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian 11
bullseye/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian 11 Backports
bullseye-backports/main
wpa 2.10 misc wpa@packages.debian.org, andrewsh@debian.org
Debian 12
bookworm/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
Debian Unstable
sid/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
Debian Janitor - Snapshots wpa 2.10+git20220401.1.c5d9f90 Potentially vulnerable - wpa@packages.debian.org, andrewsh@debian.org
Deepin
main
wpa 2.9.0.5 Potentially vulnerable - wpa@packages.debian.org, andrewsh@debian.org
Devuan 3.0
beowulf/main
wpa 2.7+git20190128+0c1e29f Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Devuan 4.0
chimaera/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Devuan Unstable
unstable/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
distri wpa_supplicant 2.9 Potentially vulnerable - -
DPorts net/wpa_supplicant_gui 2.10 net yuri@freebsd.org
DPorts security/wpa_supplicant 2.10 security cy@freebsd.org
EuroLinux 8
baseos
wpa_supplicant 2.10 System Environment/Base -
EuroLinux 8
baseos
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base -
EuroLinux 8
baseos
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base -
EuroLinux 8
baseos
wpa_supplicant 2.9 Potentially vulnerable System Environment/Base -
EuroLinux 9
baseos
wpa_supplicant 2.10 Unspecified -
EuroLinux 9
baseos
wpa_supplicant 2.10 Unspecified -
EuroLinux 9
baseos
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Exherbo
arbor
net-wireless/wpa_supplicant scm net-wireless fallback-mnt-exherbo@repology
Exherbo
arbor
net-wireless/wpa_supplicant 2.10 net-wireless fallback-mnt-exherbo@repology
Fedora 26
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 26
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 27
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 27
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 28
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 28
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 29
updates
wpa_supplicant 2.7 Potentially vulnerable System Environment/Base -
Fedora 29
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 30
updates
wpa_supplicant 2.8 Potentially vulnerable Unspecified -
Fedora 30
release
wpa_supplicant 2.7 Potentially vulnerable Unspecified -
Fedora 31
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 31
updates
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 32
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 32
updates
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 33
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 33
updates
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 34
updates
wpa_supplicant 2.10 Unspecified -
Fedora 34
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 35
updates
wpa_supplicant 2.10 Unspecified -
Fedora 35
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 36
release
wpa_supplicant 2.10 Unspecified -
Fedora 37
release
wpa_supplicant 2.10 Unspecified -
Fedora 38
release
wpa_supplicant 2.10 Unspecified -
Fedora Rawhide
development
wpa_supplicant 2.10 Unspecified -
FreeBSD Ports net/wpa_supplicant_gui 2.10 net yuri@freebsd.org
FreeBSD Ports security/wpa_supplicant 2.10 security cy@freebsd.org
Gentoo net-wireless/wpa_supplicant 9999 net-wireless zerochaos@gentoo.org
Gentoo net-wireless/wpa_supplicant 2.10 net-wireless zerochaos@gentoo.org
GNU Guix wpa-supplicant 2.10 - -
GNU Guix wpa-supplicant-gui 2.10 - -
GNU Guix wpa-supplicant-minimal 2.10 - -
GoboLinux WPA_Supplicant 2.9 Potentially vulnerable - -
HaikuPorts master net-wireless/wpa_supplicant 2.10.haiku.2 Potentially vulnerable net-wireless -
Kali Linux Rolling
main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
KaOS
core
wpa_supplicant 2.10 - demm@kaosx.us
LiGurOS stable net-wireless/wpa_supplicant 2.10 net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS stable net-wireless/wpa_supplicant 2.10 net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS stable net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS stable net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS develop net-wireless/wpa_supplicant 2.10 net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS develop net-wireless/wpa_supplicant 2.10 net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS develop net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless dev@liguros.net, zerochaos@gentoo.org
LiGurOS develop net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless dev@liguros.net, zerochaos@gentoo.org
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/release
wpa_supplicant 2.7 Potentially vulnerable Communications/Mobile -
Mageia 8
core/release
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 8
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 8
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 8
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia Cauldron
core/release
wpa_supplicant 2.10 Communications/Mobile -
Manjaro Stable
core
wpa_supplicant 2.10 - -
Manjaro Testing
core
wpa_supplicant 2.10 - -
Manjaro Unstable
core
wpa_supplicant 2.10 - -
MidnightBSD mports security/wpa_supplicant 2.6 Potentially vulnerable net -
nixpkgs stable 21.11 wpa_supplicant 2.9 Potentially vulnerable - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 21.11 wpa_gui 2.9 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 21.11 wpa_supplicant 2.9 Potentially vulnerable - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 22.05 wpa_gui 2.10 - fallback-mnt-nix@repology
nixpkgs stable 22.05 wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 22.05 wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 22.11 wpa_gui 2.10 - fallback-mnt-nix@repology
nixpkgs stable 22.11 wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 22.11 wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 23.05 wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs stable 23.05 wpa_gui 2.10 - fallback-mnt-nix@repology
nixpkgs stable 23.05 wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs unstable wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
nixpkgs unstable wpa_gui 2.10 - fallback-mnt-nix@repology
nixpkgs unstable wpa_supplicant 2.10 - marco-oweber@gmx.de, maximilian@mbosch.me
NOIR Linux Main
extra
wpa_supplicant 2.10 - m_matongo@icloud.com
OpenBSD Ports security/wpa_supplicant 2.9 Potentially vulnerable security ports@openbsd.org
openEuler 20.03
source
wpa_supplicant 2.6 Potentially vulnerable Unspecified -
openEuler 22.03
source
wpa_supplicant 2.6 Potentially vulnerable Unspecified -
openmamba
devel
wpa_supplicant 2.10 Network/Security silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.0
main/release
wpa_supplicant 2.7 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.1
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications nobodydead@gmail.com
OpenMandriva 4.2
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.3
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications bero+massbuild@lindev.ch
OpenMandriva 4.3
main/updates
wpa_supplicant 2.8 Potentially vulnerable Communications mandian@tutanota.com
OpenMandriva Rolling
main/release
wpa_supplicant 2.10 Communications tpgxyz@gmail.com
OpenMandriva Cooker
main/release
wpa_supplicant 2.10 Communications tpgxyz@gmail.com
openSUSE Leap 42.3
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 42.3
main/oss
wpa_supplicant 2.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 42.3
updates/oss
wpa_supplicant 2.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
main/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
main/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.2
updates/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
main/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.3
main/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.4
main/oss
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
openSUSE Leap 15.5
main/oss
wpa_supplicant 2.10 Unspecified -
openSUSE Tumbleweed
src-oss
wpa_supplicant 2.10 Unspecified -
Parabola
core
wpa_supplicant 2.10 - -
Pardus 21
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Parrot
parrot/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Parrot
parrot-updates/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
PCLinuxOS wpa_supplicant 2.10 Communications -
Pisi Linux
main
wpa_supplicant 2.10 service admins@pisilinux.org
pkgsrc current net/wpa_gui 2.6 Potentially vulnerable net pkgsrc-users@netbsd.org
pkgsrc current net/wpa_supplicant 2.6 Potentially vulnerable net reed@reedmedia.net
PLD Linux wpa_supplicant 2.9 Potentially vulnerable - -
PureOS Amber wpa 2.7+git20190128+0c1e29f Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
PureOS landing wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Raspbian Oldstable
main
wpa 2.7+git20190128+0c1e29f Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Raspbian Oldstable
main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Raspbian Stable
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Raspbian Stable
main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Raspbian Testing
main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
Raspbian Testing
main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Ravenports wpa_supplicant 2.10 security fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
wpa_supplicant 2.10 System Environment/Base infrastructure@rockylinux.org
Rocky Linux 9
BaseOS
wpa_supplicant 2.10 Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
wpa_supplicant 2.6 Potentially vulnerable - -
Rosa 2014.1
main/release
wpa_supplicant 2.2 Potentially vulnerable - -
Rosa 2016.1
main/release
wpa_supplicant 2.6 Potentially vulnerable - -
Rosa 2016.1
main/updates
wpa_supplicant 2.6 Potentially vulnerable - -
Rosa 2021.1
main/release
wpa_supplicant 2.10 Communications m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
wpa_supplicant 2.0 Potentially vulnerable System Environment/Base alex2048@mail.ru
Rosa Server 7.5
base/release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base alex2048@mail.ru
Rosa Server 7.5
base/release
wpa_supplicant 2.0 Potentially vulnerable System Environment/Base alex2048@mail.ru
Salix 14.2 wpa_supplicant 2.6 Potentially vulnerable - -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Slackware 14.2
patches
wpa_supplicant 2.9 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
wpa_supplicant 2.5 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
wpa_supplicant 2.10 - volkerdi@slackware.com
Slackware current
slackware
wpa_supplicant 2.10 - volkerdi@slackware.com
Slackware64 14.2
patches
wpa_supplicant 2.9 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
wpa_supplicant 2.5 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
wpa_supplicant 2.10 - volkerdi@slackware.com
Slackware64 current
slackware64
wpa_supplicant 2.10 - volkerdi@slackware.com
Slackwarearm 14.2
patches
wpa_supplicant 2.9 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
wpa_supplicant 2.5 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
wpa_supplicant 2.10 - volkerdi@slackware.com
SliTaz Cooking wpa_supplicant 2.9 Potentially vulnerable utilities 0dddba11@googlemail.com
SliTaz Next wpa_supplicant 2.6 Potentially vulnerable utilities devel@slitaz.org
SliTaz Next wpa_supplicant 2.6 Potentially vulnerable utilities devel@slitaz.org
Solus wpa_supplicant 2.9 Potentially vulnerable network.base josephriches@gmail.com
Solus wpa_supplicant-dbginfo 2.9 Potentially vulnerable debug josephriches@gmail.com
T2 SDE wpa_supplicant 2.10 extra/network t2@t2-project.org
Termux wpa-supplicant 2.10 - termux@github
Trisquel 10.0
nabia-updates/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Trisquel 10.0
nabia-security/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Trisquel 10.0
nabia/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Trisquel 11.0
aramo/main
wpa 2.10 net trisquel-devel@listas.trisquel.info, andrewsh@debian.org
Trisquel 11.0
aramo-updates/main
wpa 2.10 net trisquel-devel@listas.trisquel.info, andrewsh@debian.org
Ubuntu 14.04
trusty/main
wpa 2.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Ubuntu 14.04
trusty-updates/main
wpa 2.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Ubuntu 16.04
xenial-updates/main
wpa 2.4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, s.l-h@gmx.de
Ubuntu 16.04
xenial/main
wpa 2.4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, s.l-h@gmx.de
Ubuntu 18.04
bionic/main
wpa 2.6 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 18.04
bionic-updates/main
wpa 2.6 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 20.04
focal/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 20.04
focal-updates/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 22.04
jammy-updates/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
Ubuntu 22.04
jammy/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
Ubuntu 22.10
kinetic/main
wpa 2.10 net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 23.04
lunar/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
Ubuntu 23.10
mantic/main
wpa 2.10 net wpa@packages.debian.org, andrewsh@debian.org
UnitedRPMs Fedora 32
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
UnitedRPMs Fedora 33
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
UnitedRPMs Fedora 34
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
UnitedRPMs Fedora 35
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Void Linux x86_64
x86_64
wpa_gui 2.10 - leah@vuxu.org
Void Linux x86_64
x86_64
wpa_supplicant 2.10 - gottox@voidlinux.org
Wikidata wpa_supplicant 2.10 - -
yiffOS Knot wpa_supplicant 2.10 - evie@eviee.gay