Skip to navigation

Bug Fix Advisory wpa_supplicant bug fix and enhancement update

Advisory: RHBA-2013:0225-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-02-04
Last updated on: 2013-02-04
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated wpa_supplicant packages that fix one bug and add an enhancement are now
available for Red Hat Enterprise Linux 6.

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP,
WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. It
implements key negotiation with a WPA Authenticator for client stations and
controls the roaming and IEEE 802.11 authentication/association of the WLAN
driver.

This update fixes the following bug:

* Previously, the supplicant would attempt to roam to slightly stronger access
points, increasing the chance of a disconnection. This bug has been fixed and
the supplicant now only attempts to roam to a stronger access point when the
current signal is significantly degraded. (BZ#855255)

This update adds the following enhancement:

* Support for Opportunistic Key Caching (OKC), also known as Proactive Key
Caching (PKC), has been added to WPA Supplicant to facilitate faster and less
error-prone roaming between access points in the same network. (BZ#855273)

Users of wpa_supplicant are advised to upgrade to these updated packages, which
fix this bug and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
wpa_supplicant-0.7.3-4.el6_3.src.rpm     MD5: c00fff06c789c9f41a77389582ef67f1
SHA-256: cf1f274d39a23fb8539cc676271cb1683201256f88e62e8b0cc2014e748fa766
 
IA-32:
wpa_supplicant-0.7.3-4.el6_3.i686.rpm     MD5: b030a5d33ac2bdfbe1a7772b97d8bb51
SHA-256: 9944b32138bd77bfb6467f2f1fcdc8b6db51ec09e4d3b1b1c6a1dccf3eff121b
wpa_supplicant-debuginfo-0.7.3-4.el6_3.i686.rpm     MD5: f2e982f664e311ffe0c50b1426caf30a
SHA-256: 27e1783c5144404ff7c9990269ae30885d4b19caa08e4eac6e0ebb0e154b754c
 
x86_64:
wpa_supplicant-0.7.3-4.el6_3.x86_64.rpm     MD5: 468d0c96a89a53ab4f0d66837398847d
SHA-256: 0233e003932064b7be73ccb59e64df9558d98ebc48327597481570cec84c901f
wpa_supplicant-debuginfo-0.7.3-4.el6_3.x86_64.rpm     MD5: ff515786668c8bf01c7ebd25eab23aa8
SHA-256: 0035a84b0746814a5f9606c81030dcf521c54a592606c40922b0c82f7f684162
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
wpa_supplicant-0.7.3-4.el6_3.src.rpm     MD5: c00fff06c789c9f41a77389582ef67f1
SHA-256: cf1f274d39a23fb8539cc676271cb1683201256f88e62e8b0cc2014e748fa766
 
x86_64:
wpa_supplicant-0.7.3-4.el6_3.x86_64.rpm     MD5: 468d0c96a89a53ab4f0d66837398847d
SHA-256: 0233e003932064b7be73ccb59e64df9558d98ebc48327597481570cec84c901f
wpa_supplicant-debuginfo-0.7.3-4.el6_3.x86_64.rpm     MD5: ff515786668c8bf01c7ebd25eab23aa8
SHA-256: 0035a84b0746814a5f9606c81030dcf521c54a592606c40922b0c82f7f684162
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
wpa_supplicant-0.7.3-4.el6_3.src.rpm     MD5: c00fff06c789c9f41a77389582ef67f1
SHA-256: cf1f274d39a23fb8539cc676271cb1683201256f88e62e8b0cc2014e748fa766
 
IA-32:
wpa_supplicant-0.7.3-4.el6_3.i686.rpm     MD5: b030a5d33ac2bdfbe1a7772b97d8bb51
SHA-256: 9944b32138bd77bfb6467f2f1fcdc8b6db51ec09e4d3b1b1c6a1dccf3eff121b
wpa_supplicant-debuginfo-0.7.3-4.el6_3.i686.rpm     MD5: f2e982f664e311ffe0c50b1426caf30a
SHA-256: 27e1783c5144404ff7c9990269ae30885d4b19caa08e4eac6e0ebb0e154b754c
 
PPC:
wpa_supplicant-0.7.3-4.el6_3.ppc64.rpm     MD5: 0f800cf6b447ece02fe9e3f9baa9e61c
SHA-256: 07e919782568e75ab980f755c8e932c0fec3f6a5407ebcb2b1efadf8f49f4262
wpa_supplicant-debuginfo-0.7.3-4.el6_3.ppc64.rpm     MD5: 857e41308a3a0d4764321fd504dc4d43
SHA-256: 56eadae15eba141e31c8d26af7ede54e5d2c52b0f2019e52eb20c19e4aee377f
 
s390x:
wpa_supplicant-0.7.3-4.el6_3.s390x.rpm     MD5: 3c7a204b2d2eb2917171602fc1d3302e
SHA-256: 055b6921ab908951dbd9b144d59ca6393636fb5dd22b4818b23d47cb90de8911
wpa_supplicant-debuginfo-0.7.3-4.el6_3.s390x.rpm     MD5: cd2235552958604a26c7a3d8e4007936
SHA-256: 4c53de0809144f52d12176ddb1f78965b71b1bfa89f9d313a390a15007203169
 
x86_64:
wpa_supplicant-0.7.3-4.el6_3.x86_64.rpm     MD5: 468d0c96a89a53ab4f0d66837398847d
SHA-256: 0233e003932064b7be73ccb59e64df9558d98ebc48327597481570cec84c901f
wpa_supplicant-debuginfo-0.7.3-4.el6_3.x86_64.rpm     MD5: ff515786668c8bf01c7ebd25eab23aa8
SHA-256: 0035a84b0746814a5f9606c81030dcf521c54a592606c40922b0c82f7f684162
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
wpa_supplicant-0.7.3-4.el6_3.src.rpm     MD5: c00fff06c789c9f41a77389582ef67f1
SHA-256: cf1f274d39a23fb8539cc676271cb1683201256f88e62e8b0cc2014e748fa766
 
IA-32:
wpa_supplicant-0.7.3-4.el6_3.i686.rpm     MD5: b030a5d33ac2bdfbe1a7772b97d8bb51
SHA-256: 9944b32138bd77bfb6467f2f1fcdc8b6db51ec09e4d3b1b1c6a1dccf3eff121b
wpa_supplicant-debuginfo-0.7.3-4.el6_3.i686.rpm     MD5: f2e982f664e311ffe0c50b1426caf30a
SHA-256: 27e1783c5144404ff7c9990269ae30885d4b19caa08e4eac6e0ebb0e154b754c
 
PPC:
wpa_supplicant-0.7.3-4.el6_3.ppc64.rpm     MD5: 0f800cf6b447ece02fe9e3f9baa9e61c
SHA-256: 07e919782568e75ab980f755c8e932c0fec3f6a5407ebcb2b1efadf8f49f4262
wpa_supplicant-debuginfo-0.7.3-4.el6_3.ppc64.rpm     MD5: 857e41308a3a0d4764321fd504dc4d43
SHA-256: 56eadae15eba141e31c8d26af7ede54e5d2c52b0f2019e52eb20c19e4aee377f
 
s390x:
wpa_supplicant-0.7.3-4.el6_3.s390x.rpm     MD5: 3c7a204b2d2eb2917171602fc1d3302e
SHA-256: 055b6921ab908951dbd9b144d59ca6393636fb5dd22b4818b23d47cb90de8911
wpa_supplicant-debuginfo-0.7.3-4.el6_3.s390x.rpm     MD5: cd2235552958604a26c7a3d8e4007936
SHA-256: 4c53de0809144f52d12176ddb1f78965b71b1bfa89f9d313a390a15007203169
 
x86_64:
wpa_supplicant-0.7.3-4.el6_3.x86_64.rpm     MD5: 468d0c96a89a53ab4f0d66837398847d
SHA-256: 0233e003932064b7be73ccb59e64df9558d98ebc48327597481570cec84c901f
wpa_supplicant-debuginfo-0.7.3-4.el6_3.x86_64.rpm     MD5: ff515786668c8bf01c7ebd25eab23aa8
SHA-256: 0035a84b0746814a5f9606c81030dcf521c54a592606c40922b0c82f7f684162
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
wpa_supplicant-0.7.3-4.el6_3.src.rpm     MD5: c00fff06c789c9f41a77389582ef67f1
SHA-256: cf1f274d39a23fb8539cc676271cb1683201256f88e62e8b0cc2014e748fa766
 
IA-32:
wpa_supplicant-0.7.3-4.el6_3.i686.rpm     MD5: b030a5d33ac2bdfbe1a7772b97d8bb51
SHA-256: 9944b32138bd77bfb6467f2f1fcdc8b6db51ec09e4d3b1b1c6a1dccf3eff121b
wpa_supplicant-debuginfo-0.7.3-4.el6_3.i686.rpm     MD5: f2e982f664e311ffe0c50b1426caf30a
SHA-256: 27e1783c5144404ff7c9990269ae30885d4b19caa08e4eac6e0ebb0e154b754c
 
x86_64:
wpa_supplicant-0.7.3-4.el6_3.x86_64.rpm     MD5: 468d0c96a89a53ab4f0d66837398847d
SHA-256: 0233e003932064b7be73ccb59e64df9558d98ebc48327597481570cec84c901f
wpa_supplicant-debuginfo-0.7.3-4.el6_3.x86_64.rpm     MD5: ff515786668c8bf01c7ebd25eab23aa8
SHA-256: 0035a84b0746814a5f9606c81030dcf521c54a592606c40922b0c82f7f684162
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/