Versions Packages Information History CVEs Related Badges Report

Versions for wpa-supplicant

236 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
wpa_supplicant-dbus 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant-dbg 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant-doc 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_supplicant-openrc 2.9 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
wpa_gui 2.9 Potentially vulnerable - awilfox@adelielinux.org
Alpine Linux 3.8
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
wpa_supplicant 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
wpa_supplicant-doc 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
wpa_supplicant-openrc 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
wpa_supplicant-doc 2.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
wpa_supplicant 2.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
wpa_supplicant-openrc 2.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
wpa_supplicant-doc 2.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
wpa_supplicant-openrc 2.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
wpa_supplicant 2.8 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
wpa_supplicant-doc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
wpa_supplicant-openrc 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
wpa_supplicant 2.9 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
wpa_gui 2.6 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 wpa_supplicant 2.9 Potentially vulnerable Security/Networking sbolshakov@altlinux.org
ALT Sisyphus wpa_supplicant 2.9 Potentially vulnerable Security/Networking sbolshakov@altlinux.org
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Amazon Linux 2 wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
antiX-17
nosystemd
wpa 2.4 Potentially vulnerable nosystemd pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
AOSC wpa-supplicant 2.9 Potentially vulnerable net fallback-mnt-aosc@repology
Arch
core
wpa_supplicant 2.9 Potentially vulnerable - -
AUR wpa_supplicant-git 2.7.r604.g3d5cfa0f6 - chocobo1@aur
AUR wpa_supplicant_gui 2.9 Potentially vulnerable - kewl@aur
AUR wpa_supplicant-openssl-1.0 2.9 Potentially vulnerable - xdavidwu@aur
Astra Orel Stable
main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Astra Orel Current
main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Ataraxia Linux wpa_supplicant 2.9 Potentially vulnerable net nagakamira@gmail.com
Carbs Linux
extra
wpa_supplicant 2.9 Potentially vulnerable - cem@ckyln.com
CentOS 6
os
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base -
CentOS 7
os
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
CentOS 8
BaseOS
wpa_supplicant 2.7 Potentially vulnerable System Environment/Base bugs@centos.org
Chakra
core
wpa_supplicant 2.9 Potentially vulnerable - -
CRUX 3.4
opt
wpa_supplicant 2.8 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
wpa_supplicant 2.9 Potentially vulnerable - jue@crux.nu
Debian Oldstable
oldstable/main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Debian Stable
stable/main
wpa 2.7git20190128 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Testing
testing/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Testing
testing/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Testing
testing/main
wpa 2.7git20190128 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Unstable
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Unstable
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Unstable
main
wpa 2.7git20190128 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Debian Experimental
main
wpa 2.9.0git20200517 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Deepin
main
wpa 2.6 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Devuan 1.0 (Jessie)
jessie/main
wpa 2.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Devuan 2.0 (ASCII)
ascii/main
wpa 2.4 Potentially vulnerable misc pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Devuan 3.0 (Beowulf)
beowulf/main
wpa 2.7git20190128 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
wpa 2.7git20190128 Potentially vulnerable misc wpa@packages.debian.org, andrewsh@debian.org
Devuan Unstable
unstable/main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
distri wpa_supplicant 2.9 Potentially vulnerable - -
DPorts net/wpa_supplicant_gui 2.9 Potentially vulnerable net yuri@freebsd.org
DPorts security/wpa_supplicant 2.9 Potentially vulnerable security cy@freebsd.org
Exherbo
arbor
net-wireless/wpa_supplicant scm net-wireless fallback-mnt-exherbo@repology
Exherbo
arbor
net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless fallback-mnt-exherbo@repology
Fedora 26
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 26
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 27
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 27
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 28
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 28
updates
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 29
updates
wpa_supplicant 2.7 Potentially vulnerable System Environment/Base -
Fedora 29
release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Fedora 30
updates
wpa_supplicant 2.8 Potentially vulnerable Unspecified -
Fedora 30
release
wpa_supplicant 2.7 Potentially vulnerable Unspecified -
Fedora 31
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 31
updates
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora 32
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Fedora Rawhide wpa_supplicant 2.9 Potentially vulnerable Unspecified -
FreeBSD Ports net/wpa_supplicant_gui 2.9 Potentially vulnerable net yuri@freebsd.org
FreeBSD Ports security/wpa_supplicant 2.9 Potentially vulnerable security cy@freebsd.org
Funtoo 1.4
core-kit
net-wireless/wpa_supplicant 9999 net-wireless zerochaos@gentoo.org
Funtoo 1.4
core-kit
net-wireless/wpa_supplicant 2.8 Potentially vulnerable net-wireless zerochaos@gentoo.org
Funtoo 1.4
core-kit
net-wireless/wpa_supplicant 2.6 Potentially vulnerable net-wireless zerochaos@gentoo.org
Funtoo 1.4
core-kit
net-wireless/wpa_supplicant 2.6 Potentially vulnerable net-wireless zerochaos@gentoo.org
Funtoo 1.4
core-kit
net-wireless/wpa_supplicant 2.6 Potentially vulnerable net-wireless zerochaos@gentoo.org
Funtoo 1.4
core-kit
net-wireless/wpa_supplicant 2.6 Potentially vulnerable net-wireless zerochaos@gentoo.org
Gentoo net-wireless/wpa_supplicant 9999 net-wireless zerochaos@gentoo.org
Gentoo net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless zerochaos@gentoo.org
GNU Guix wpa-supplicant 2.9 Potentially vulnerable - -
GNU Guix wpa-supplicant-gui 2.9 Potentially vulnerable - -
GNU Guix wpa-supplicant-minimal 2.9 Potentially vulnerable - -
GoboLinux WPA_Supplicant 2.9 Potentially vulnerable - -
HaikuPorts master net-wireless/wpa_supplicant 2.9.haiku.1 Potentially vulnerable net-wireless -
HaikuPorts master net-wireless/wpa_supplicant 2.7~devel.haiku.1 Potentially vulnerable net-wireless -
Hyperbola
core
wpa_supplicant 2.6 Potentially vulnerable - -
Hyperbola
extra
wpa_supplicant_gui 2.5 Potentially vulnerable - -
Kali Linux Rolling
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
KaOS
core
wpa_supplicant 2.9 Potentially vulnerable - demm@kaosx.us
KISS Linux Main
extra
wpa_supplicant 2.9 Potentially vulnerable - dylan.araps@gmail.com
Kwort 4.3.2 wpa_supplicant 2.6 Potentially vulnerable - -
Kwort 4.3.3 wpa_supplicant 2.8 Potentially vulnerable - -
Kwort 4.3.4 wpa_supplicant 2.9 Potentially vulnerable - -
LiGurOS 20.7
core-kit
net-wireless/wpa_supplicant 9999 net-wireless zerochaos@gentoo.org
LiGurOS 20.7
core-kit
net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless zerochaos@gentoo.org
LiGurOS 21.1
core-kit
net-wireless/wpa_supplicant 9999 net-wireless zerochaos@gentoo.org
LiGurOS 21.1
core-kit
net-wireless/wpa_supplicant 2.9 Potentially vulnerable net-wireless zerochaos@gentoo.org
Mageia 6
core/release
wpa_supplicant 2.6 Potentially vulnerable Communications/Mobile -
Mageia 6
core/updates
wpa_supplicant 2.6 Potentially vulnerable Communications/Mobile -
Mageia 6
core/updates
wpa_supplicant 2.6 Potentially vulnerable Communications/Mobile -
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/updates
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Mageia 7
core/release
wpa_supplicant 2.7 Potentially vulnerable Communications/Mobile -
Mageia Cauldron
core/release
wpa_supplicant 2.9 Potentially vulnerable Communications/Mobile -
Manjaro Stable
core
wpa_supplicant 2.9 Potentially vulnerable - -
Manjaro Stable
community
wpa_supplicant_gui 2.6 Potentially vulnerable - -
Manjaro Testing
core
wpa_supplicant 2.9 Potentially vulnerable - -
Manjaro Testing
community
wpa_supplicant_gui 2.6 Potentially vulnerable - -
Manjaro Unstable
core
wpa_supplicant 2.9 Potentially vulnerable - -
Manjaro Unstable
community
wpa_supplicant_gui 2.6 Potentially vulnerable - -
nixpkgs stable wpa_gui 2.9 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable wpa_supplicant 2.9 Potentially vulnerable - marco-oweber@gmx.de
nixpkgs unstable wpa_gui 2.9 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable wpa_supplicant 2.9 Potentially vulnerable - marco-oweber@gmx.de
OpenBSD Ports security/wpa_supplicant 2.9 Potentially vulnerable security ports@openbsd.org
openEuler 20.03
source
wpa_supplicant 2.6 Potentially vulnerable Unspecified -
OpenMandriva 3.0
main/updates
wpa_supplicant 2.7 Potentially vulnerable Communications tpgxyz@gmail.com
OpenMandriva 3.0
main/release
wpa_supplicant 2.5 Potentially vulnerable Communications tpgxyz@gmail.com
OpenMandriva 3.0
main/release
wpa_supplicant 2.4 Potentially vulnerable Communications nobodydead@gmail.com
OpenMandriva 4.0
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.0
main/release
wpa_supplicant 2.7 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.1
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications nobodydead@gmail.com
OpenMandriva Rolling
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva Cooker
main/release
wpa_supplicant 2.8 Potentially vulnerable Communications bero@lindev.ch
openSUSE Leap 42.3
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 42.3
main/oss
wpa_supplicant 2.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 42.3
updates/oss
wpa_supplicant 2.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
main/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
main/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.2
main/oss
wpa_supplicant 2.6 Potentially vulnerable Productivity/Networking/Other -
openSUSE Tumbleweed wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Parabola
core
wpa_supplicant 2.9 Potentially vulnerable - -
Pardus
main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Pardus
updates/main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Pardus
updates/main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Pardus
updates/main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Parrot
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
PCLinuxOS wpa_supplicant 2.9 Potentially vulnerable Communications -
PCLinuxOS wpa_supplicant 2.6 Potentially vulnerable Communications -
Pisi Linux
main
wpa_supplicant 2.9 Potentially vulnerable service admins@pisilinux.org
pkgsrc current net/wpa_gui 2.6 Potentially vulnerable net pkgsrc-users@netbsd.org
pkgsrc current net/wpa_supplicant 2.6 Potentially vulnerable net reed@reedmedia.net
PLD Linux wpa_supplicant 2.9 Potentially vulnerable - -
PureOS Amber wpa 2.7git20190128 Potentially vulnerable misc wpa@packages.debian.org, andrewsh@debian.org
PureOS landing wpa 2.9.0 Potentially vulnerable misc wpa@packages.debian.org, andrewsh@debian.org
Raspbian Oldstable
main
wpa 2.4 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, andrewsh@debian.org, jandd@debian.org, s.l-h@gmx.de
Raspbian Oldstable
main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Raspbian Stable
main
wpa 2.7git20190128 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Raspbian Stable
main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Raspbian Testing
main
wpa 2.9.0 Potentially vulnerable net wpa@packages.debian.org, andrewsh@debian.org
Raspbian Testing
main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Ravenports wpa_supplicant 2.9 Potentially vulnerable security fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
wpa_supplicant 2.6 Potentially vulnerable - -
Rosa 2014.1
main/release
wpa_supplicant 2.2 Potentially vulnerable - -
Rosa 2016.1
main/updates
wpa_supplicant 2.6 Potentially vulnerable - -
Rosa 2016.1
main/release
wpa_supplicant 2.6 Potentially vulnerable - -
Rosa 2019.1
main/release
wpa_supplicant 2.9 Potentially vulnerable Communications alexander@mezon.ru
Rosa Server 6.9
base/release
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
wpa_supplicant 0.7.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
wpa_supplicant 2.0 Potentially vulnerable System Environment/Base alex2048@mail.ru
Rosa Server 7.5
base/release
wpa_supplicant 2.6 Potentially vulnerable System Environment/Base alex2048@mail.ru
Rosa Server 7.5
base/release
wpa_supplicant 2.0 Potentially vulnerable System Environment/Base alex2048@mail.ru
Salix 14.2 wpa_supplicant 2.6 Potentially vulnerable - -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.6 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Scientific Linux 7.x wpa_supplicant 2.0 Potentially vulnerable System Environment/Base -
Slackware 14.2
patches
wpa_supplicant 2.6 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
wpa_supplicant 2.5 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
wpa_supplicant 2.9 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
wpa_supplicant 2.6 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
wpa_supplicant 2.5 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
wpa_supplicant 2.9 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
wpa_supplicant 2.6 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
wpa_supplicant 2.5 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
wpa_supplicant 2.9 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking wpa_supplicant 2.9 Potentially vulnerable utilities 0dddba11@googlemail.com
SliTaz Next wpa_supplicant 2.6 Potentially vulnerable utilities devel@slitaz.org
Solus wpa_supplicant 2.9 Potentially vulnerable network.base joshua@streambits.io
Solus wpa_supplicant-dbginfo 2.9 Potentially vulnerable debug joshua@streambits.io
T2 SDE wpa_supplicant 2.9 Potentially vulnerable extra/network t2@t2-project.org
Termux wpa-supplicant 2.9 Potentially vulnerable - termux@termux
Trisquel 6.0
toutatis/main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Trisquel 6.0
toutatis-updates/main
wpasupplicant 0.7.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, kel@otaku42.de, s.l-h@gmx.de
Trisquel 7.0
belenos/main
wpa 2.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Trisquel 7.0
belenos-updates/main
wpa 2.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Trisquel 8.0
flidas/main
wpa 2.4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, s.l-h@gmx.de
Trisquel 8.0
flidas-updates/main
wpa 2.4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, s.l-h@gmx.de
Trisquel 8.0 backports
flidas-backports/main
wpa 2.6 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 12.04
precise/main
wpasupplicant 0.7.3 Potentially vulnerable net pkg-wpa-devel@lists.alioth.debian.org, kel@otaku42.de, s.l-h@gmx.de
Ubuntu 12.04
precise-updates/main
wpasupplicant 0.7.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, kel@otaku42.de, s.l-h@gmx.de
Ubuntu 14.04
trusty/main
wpa 2.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Ubuntu 14.04
trusty-updates/main
wpa 2.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, kel@otaku42.de, s.l-h@gmx.de
Ubuntu 16.04
xenial/main
wpa 2.4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, s.l-h@gmx.de
Ubuntu 16.04
xenial-updates/main
wpa 2.4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, jandd@debian.org, s.l-h@gmx.de
Ubuntu 18.04
bionic/main
wpa 2.6 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 18.04
bionic-updates/main
wpa 2.6 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 19.10
eoan/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 20.04
focal/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 20.04
focal-updates/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
Ubuntu 20.10
groovy/main
wpa 2.9 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, andrewsh@debian.org
UnitedRPMs Fedora 30
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
UnitedRPMs Fedora 31
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
UnitedRPMs Fedora 32
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
UnitedRPMs Fedora 33
release
wpa_supplicant 2.9 Potentially vulnerable Unspecified -
Void Linux x86_64
x86_64
wpa_gui 2.9 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
wpa_supplicant 2.9 Potentially vulnerable - gottox@voidlinux.org
Wikidata wpa_supplicant 2.9 Potentially vulnerable - -

Absent in repositories

  • AIX Open Source Packages
  • Amazon Linux 1
  • antiX-16
  • antiX-19
  • AppGet
  • Arch Testing
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Chakra Staging
  • Chakra Testing
  • Chocolatey
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Cygwin
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • DistroWatch.com
  • ELRepo el7
  • ELRepo el7 Testing
  • Entware
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • freshcode.club
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • Homebrew
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • IBM i
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • KISS Linux Games
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • Linuxbrew
  • LuaRocks
  • MacPorts
  • Maemo Fremantle
  • MELPA
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • OpenIndiana packages
  • OpenPKG
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OpenWrt 17.01 x86_64
  • OpenWrt 18.06 x86_64
  • OpenWrt 19.07 x86_64
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Scoop
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • Vcpkg
  • Whonix
  • Whonix Developers
  • winget
  • YACP