Change log for wpa package in Ubuntu

144 of 44 results
Published in bionic-release on 2017-11-14
Deleted in bionic-proposed (Reason: moved to release)
wpa (2:2.4-1.1ubuntu1) bionic; urgency=medium

  * Merge with Debian unstable; remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method
      for requesting a firmware change when working with the Android HAL;
      this is used to set a device in P2P or AP mode; conditional to
      CONFIG_ANDROID_HAL being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required
      wifi headers for the HAL support.
    - debian/patches/dbus-available-sta.patch: Make the list of connected
      stations available on DBus for hotspot mode; along with some of the
      station properties, such as rx/tx packets, bytes, capabilities, etc.

Available diffs

Superseded in bionic-release on 2017-11-14
Published in artful-release on 2017-10-17
Deleted in artful-proposed (Reason: moved to release)
wpa (2.4-0ubuntu10) artful; urgency=medium

  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

 -- Marc Deslauriers <email address hidden>  Mon, 16 Oct 2017 07:41:21 -0400

Available diffs

Published in trusty-updates on 2017-10-16
Published in trusty-security on 2017-10-16
wpa (2.1-0ubuntu1.5) trusty-security; urgency=medium

  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian jessie
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian jessie
    - CVE-2016-4476
    - CVE-2016-4477

 -- Marc Deslauriers <email address hidden>  Mon, 16 Oct 2017 08:20:18 -0400
Published in xenial-updates on 2017-10-16
Published in xenial-security on 2017-10-16
wpa (2.4-0ubuntu6.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477
  * This package does _not_ contain the changes from 2.4-0ubuntu6.1 in
    xenial-proposed.

 -- Marc Deslauriers <email address hidden>  Mon, 16 Oct 2017 07:58:48 -0400
Published in zesty-updates on 2017-10-16
Published in zesty-security on 2017-10-16
wpa (2.4-0ubuntu9.1) zesty-security; urgency=medium

  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

 -- Marc Deslauriers <email address hidden>  Mon, 16 Oct 2017 07:41:21 -0400
Deleted in xenial-proposed on 2017-10-20 (Reason: moved to -updates)
wpa (2.4-0ubuntu6.1) xenial; urgency=medium

  * debian/patches/wpa_service_ignore-on-isolate.patch: Add IgnoreOnIsolate=yes
    so when isolating to default.target as oem-config does, we don't stop
    wpasupplicant and cause wifi to be unavailable. (LP: #1576024)

 -- Mathieu Trudel-Lapierre <email address hidden>  Thu, 31 Aug 2017 14:31:25 -0400

Available diffs

Superseded in artful-release on 2017-10-17
Published in zesty-release on 2017-03-18
Deleted in zesty-proposed (Reason: moved to release)
wpa (2.4-0ubuntu9) zesty; urgency=medium

  * debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes
    so that when switching "runlevels" in oem-config will not kill off wpa
    and cause wireless to be unavailable on first boot. (LP: #1576024)

 -- Mathieu Trudel-Lapierre <email address hidden>  Mon, 13 Mar 2017 13:46:12 -0400

Available diffs

Superseded in zesty-release on 2017-03-18
Published in yakkety-release on 2016-09-20
Deleted in yakkety-proposed (Reason: moved to release)
wpa (2.4-0ubuntu8) yakkety; urgency=medium

  * No-change rebuild for readline soname change.

 -- Matthias Klose <email address hidden>  Sat, 17 Sep 2016 12:12:22 +0000

Available diffs

Superseded in yakkety-release on 2016-09-20
Deleted in yakkety-proposed on 2016-09-21 (Reason: moved to release)
wpa (2.4-0ubuntu7) yakkety; urgency=medium

  * debian/ifupdown/functions.sh: Fix handling for "wpa-roam". Call ifquery
    instead of directly parsing /run/*/ifstate files to work with current
    ifupdown. (Closes: #545766, LP: #1545363)

 -- Paul Donohue <email address hidden>  Fri, 01 Jul 2016 09:16:21 +0200

Available diffs

Superseded in yakkety-release on 2016-07-01
Published in xenial-release on 2016-01-20
Deleted in xenial-proposed (Reason: moved to release)
wpa (2.4-0ubuntu6) xenial; urgency=medium

  * debian/patches/wpasupplicant_band_selection_aa517ae2.patch: add the last
    missing 5 GHz band selection related cherry-pick from Debian that was not
    included in wpa 2.4 (LP: #1517040)

 -- Timo Jyrinki <email address hidden>  Tue, 19 Jan 2016 12:36:00 +0200

Available diffs

Superseded in xenial-release on 2016-01-20
Deleted in xenial-proposed on 2016-01-21 (Reason: moved to release)
wpa (2.4-0ubuntu5) xenial; urgency=medium

  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315
  * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
    message
    - debian/patches/CVE-2015-5316.patch: fix error path in
      src/eap_peer/eap_pwd.c.
    - CVE-2015-5316
  * SECURITY UPDATE: denial of service in NDEF record parser
    - debian/patches/CVE-2015-8041.patch: validate payload lengths in
      src/wps/ndef.c.
    - CVE-2015-8041

 -- Marc Deslauriers <email address hidden>  Tue, 10 Nov 2015 13:38:25 -0500

Available diffs

Published in wily-updates on 2015-11-10
Published in wily-security on 2015-11-10
wpa (2.4-0ubuntu3.2) wily-security; urgency=medium

  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315
  * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
    message
    - debian/patches/CVE-2015-5316.patch: fix error path in
      src/eap_peer/eap_pwd.c.
    - CVE-2015-5316
  * This package does _not_ contain the changes from 2.4-0ubuntu3.1 in
    wily-proposed.

 -- Marc Deslauriers <email address hidden>  Mon, 09 Nov 2015 06:52:23 -0600
Published in vivid-updates on 2015-11-10
Published in vivid-security on 2015-11-10
wpa (2.1-0ubuntu7.3) vivid-security; urgency=medium

  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

 -- Marc Deslauriers <email address hidden>  Mon, 09 Nov 2015 07:22:31 -0600

Available diffs

Superseded in trusty-updates on 2017-10-16
Superseded in trusty-security on 2017-10-16
wpa (2.1-0ubuntu1.4) trusty-security; urgency=medium

  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

 -- Marc Deslauriers <email address hidden>  Mon, 09 Nov 2015 07:23:28 -0600

Available diffs

Deleted in wily-proposed on 2015-11-18 (Reason: moved to -updates)
wpa (2.4-0ubuntu3.1) wily-proposed; urgency=medium

  * Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume
    before/after suspend, like the pm-utils hook. In some cases this brings
    back missing Wifi connection after resuming. (LP: #1422143)

 -- Martin Pitt <email address hidden>  Mon, 26 Oct 2015 14:24:30 +0100

Available diffs

Superseded in xenial-release on 2015-11-11
Deleted in xenial-proposed on 2015-11-12 (Reason: moved to release)
wpa (2.4-0ubuntu4) xenial; urgency=medium

  * Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume
    before/after suspend, like the pm-utils hook. In some cases this brings
    back missing Wifi connection after resuming. (LP: #1422143)

 -- Martin Pitt <email address hidden>  Mon, 26 Oct 2015 14:24:30 +0100

Available diffs

Superseded in xenial-release on 2015-10-26
Published in wily-release on 2015-10-07
Deleted in wily-proposed (Reason: moved to release)
wpa (2.4-0ubuntu3) wily; urgency=medium

  * debian/patches/dbus-fix-operations-for-p2p-mgmt.patch: fix operations
    when P2P management interface is used (LP: #1482439)

 -- Ricardo Salveti de Araujo <email address hidden>  Wed, 07 Oct 2015 10:21:39 -0300

Available diffs

Superseded in wily-release on 2015-10-07
Deleted in wily-proposed on 2015-10-09 (Reason: moved to release)
wpa (2.4-0ubuntu2) wily; urgency=medium

  * debian/config/wpasupplicant/linux:
    - Reduce the delta to Debian by removing the double setting of CONFIG_AP
      and CONFIG_P2P. The only actual delta is CONFIG_ANDROID_HAL.

 -- Timo Jyrinki <email address hidden>  Mon, 03 Aug 2015 22:03:51 +0300

Available diffs

Superseded in wily-release on 2015-08-18
Deleted in wily-proposed on 2015-08-20 (Reason: moved to release)
wpa (2.4-0ubuntu1) wily; urgency=medium

  * New upstream release.
  * Merge with Debian unstable; remaining changes:
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method for
      requesting a firmware change when working with the Android HAL; this is
      used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
      being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required wifi
      headers for the HAL support.
    - debian/patches/dbus-available-sta.patch: Make the list of connected
      stations available on DBus for hotspot mode; along with some of the
      station properties, such as rx/tx packets, bytes, capabilities, etc.
    - debian/patches/CVE-2015-4141.patch: check chunk size: src/wps/httpread.c
      - CVE-2015-4141
    - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
      - CVE-2015-4142
    - debian/patches/CVE-2015-4143-4146.patch: check lengths in
        src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
      - CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
    - debian/config/wpasupplicant/linux:
      - Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
      - Enable CONFIG_P2P (Wi-Fi Direct support).
  * debian/patches/wpa_supplicant-MACsec-fix-build-failure-for-IEEE8021.patch,
    debian/patches/include-ieee802_11_common.c-in-wpa_supplicant-build-.patch,
    d/p/hostapd_fix-hostapd-operation-without-hw_mode-driver-data.patch:
    dropped patches included upstream.
  * Refreshed all patches.

 -- Mathieu Trudel-Lapierre <email address hidden>  Mon, 27 Jul 2015 17:29:24 -0400

Available diffs

Superseded in wily-release on 2015-08-03
Deleted in wily-proposed on 2015-08-04 (Reason: moved to release)
wpa (2.1-0ubuntu8) wily; urgency=medium

  * SECURITY UPDATE: memcpy overflow in P2P functionality
    - debian/patches/CVE-2015-1863.patch: validate SID element length in
      src/p2p/p2p.c.
    - CVE-2015-1863
  * SECURITY UPDATE: denial of service via WPS UPnP
    - debian/patches/CVE-2015-4141.patch: check chunk size in
      src/wps/httpread.c.
    - CVE-2015-4141
  * SECURITY UPDATE: denial of service via AP mode WMM Action frame
    - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
    - CVE-2015-4142
  * SECURITY UPDATE: denial of service via EAP-pwd
    - debian/patches/CVE-2015-4143-4146.patch: check lengths in
      src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
    - CVE-2015-4143
    - CVE-2015-4144
    - CVE-2015-4145
    - CVE-2015-4146

 -- Marc Deslauriers <email address hidden>  Mon, 15 Jun 2015 10:21:54 -0400

Available diffs

Obsolete in utopic-updates on 2016-11-03
Obsolete in utopic-security on 2016-11-03
wpa (2.1-0ubuntu4.2) utopic-security; urgency=medium

  * SECURITY UPDATE: denial of service via WPS UPnP
    - debian/patches/CVE-2015-4141.patch: check chunk size in
      src/wps/httpread.c.
    - CVE-2015-4141
  * SECURITY UPDATE: denial of service via AP mode WMM Action frame
    - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
    - CVE-2015-4142
  * SECURITY UPDATE: denial of service via EAP-pwd
    - debian/patches/CVE-2015-4143-4146.patch: check lengths in
      src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
    - CVE-2015-4143
    - CVE-2015-4144
    - CVE-2015-4145
    - CVE-2015-4146

 -- Marc Deslauriers <email address hidden>  Mon, 15 Jun 2015 10:33:55 -0400

Available diffs

Superseded in trusty-updates on 2015-11-10
Superseded in trusty-security on 2015-11-10
wpa (2.1-0ubuntu1.3) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via WPS UPnP
    - debian/patches/CVE-2015-4141.patch: check chunk size in
      src/wps/httpread.c.
    - CVE-2015-4141
  * SECURITY UPDATE: denial of service via AP mode WMM Action frame
    - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
    - CVE-2015-4142
  * SECURITY UPDATE: denial of service via EAP-pwd
    - debian/patches/CVE-2015-4143-4146.patch: check lengths in
      src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
    - CVE-2015-4143
    - CVE-2015-4144
    - CVE-2015-4145
    - CVE-2015-4146

 -- Marc Deslauriers <email address hidden>  Mon, 15 Jun 2015 10:34:37 -0400

Available diffs

Superseded in vivid-updates on 2015-11-10
Superseded in vivid-security on 2015-11-10
wpa (2.1-0ubuntu7.2) vivid-security; urgency=medium

  * SECURITY UPDATE: denial of service via WPS UPnP
    - debian/patches/CVE-2015-4141.patch: check chunk size in
      src/wps/httpread.c.
    - CVE-2015-4141
  * SECURITY UPDATE: denial of service via AP mode WMM Action frame
    - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
    - CVE-2015-4142
  * SECURITY UPDATE: denial of service via EAP-pwd
    - debian/patches/CVE-2015-4143-4146.patch: check lengths in
      src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
    - CVE-2015-4143
    - CVE-2015-4144
    - CVE-2015-4145
    - CVE-2015-4146

 -- Marc Deslauriers <email address hidden>  Mon, 15 Jun 2015 10:32:33 -0400

Available diffs

Superseded in vivid-updates on 2015-06-16
Superseded in vivid-security on 2015-06-16
wpa (2.1-0ubuntu7.1) vivid-security; urgency=medium

  * SECURITY UPDATE: memcpy overflow in P2P functionality
    - debian/patches/CVE-2015-1863.patch: validate SID element length in
      src/p2p/p2p.c.
    - CVE-2015-1863
 -- Marc Deslauriers <email address hidden>   Mon, 20 Apr 2015 13:42:02 -0400
Superseded in utopic-updates on 2015-06-16
Superseded in utopic-security on 2015-06-16
wpa (2.1-0ubuntu4.1) utopic-security; urgency=medium

  * SECURITY UPDATE: memcpy overflow in P2P functionality
    - debian/patches/CVE-2015-1863.patch: validate SID element length in
      src/p2p/p2p.c.
    - CVE-2015-1863
 -- Marc Deslauriers <email address hidden>   Mon, 20 Apr 2015 13:44:35 -0400
Superseded in trusty-updates on 2015-06-16
Superseded in trusty-security on 2015-06-16
wpa (2.1-0ubuntu1.2) trusty-security; urgency=medium

  * SECURITY UPDATE: memcpy overflow in P2P functionality
    - debian/patches/CVE-2015-1863.patch: validate SID element length in
      src/p2p/p2p.c.
    - CVE-2015-1863
 -- Marc Deslauriers <email address hidden>   Mon, 20 Apr 2015 13:45:07 -0400

Available diffs

Superseded in wily-release on 2015-06-24
Published in vivid-release on 2015-03-27
Deleted in vivid-proposed (Reason: moved to release)
wpa (2.1-0ubuntu7) vivid; urgency=medium

  Cherry-pick from Debian svn:
  * Add wpasupplicant_fix-systemd-unit-dependencies.patch: Fix systemd unit
    dependencies for wpasupplicant, it needs to be started before the network
    target (Closes: 780552, LP: #1431774).
 -- Martin Pitt <email address hidden>   Fri, 27 Mar 2015 14:07:35 +0100

Available diffs

Superseded in vivid-release on 2015-03-27
Deleted in vivid-proposed on 2015-03-28 (Reason: moved to release)
wpa (2.1-0ubuntu6) vivid; urgency=medium

  * debian/patches/dbus-available-sta.patch: Make the list of connected
    stations available on DBus for hotspot mode; along with some of the
    station properties, such as rx/tx packets, bytes, capabilities, etc.
 -- Mathieu Trudel-Lapierre <email address hidden>   Fri, 19 Dec 2014 13:29:30 -0500

Available diffs

Superseded in vivid-release on 2014-12-19
Deleted in vivid-proposed on 2014-12-21 (Reason: moved to release)
wpa (2.1-0ubuntu5) vivid; urgency=medium

  * debian/patches/android_hal_fw_path_change.patch: add a DBus method for
    requesting a firmware change when working with the Android HAL; this is
    used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
    being enabled.
  * debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
  * debian/control: Build-Depends on android-headers to get the required wifi
    headers for the HAL support.
 -- Mathieu Trudel-Lapierre <email address hidden>   Mon, 08 Dec 2014 21:05:25 -0500

Available diffs

Superseded in vivid-release on 2014-12-12
Obsolete in utopic-release on 2016-11-03
Deleted in utopic-proposed on 2016-11-03 (Reason: moved to release)
wpa (2.1-0ubuntu4) utopic; urgency=medium

  * SECURITY UPDATE: arbitrary command execution via unsanitized string
    passed to action scripts by wpa_cli and hostapd_cli
    - debian/patches/CVE-2014-3686.patch: added os_exec() helper to
      src/utils/os.h, src/utils/os_unix.c, src/utils/os_win32.c,
      use instead of system() in wpa_supplicant/wpa_cli.c,
      hostapd/hostapd_cli.c.
    - CVE-2014-3686
 -- Marc Deslauriers <email address hidden>   Fri, 10 Oct 2014 09:15:39 -0400

Available diffs

Superseded in trusty-updates on 2015-04-23
Superseded in trusty-security on 2015-04-23
wpa (2.1-0ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: arbitrary command execution via unsanitized string
    passed to action scripts by wpa_cli and hostapd_cli
    - debian/patches/CVE-2014-3686.patch: added os_exec() helper to
      src/utils/os.h, src/utils/os_unix.c, src/utils/os_win32.c,
      use instead of system() in wpa_supplicant/wpa_cli.c,
      hostapd/hostapd_cli.c.
    - CVE-2014-3686
 -- Marc Deslauriers <email address hidden>   Fri, 10 Oct 2014 09:21:44 -0400
Superseded in utopic-release on 2014-10-10
Deleted in utopic-proposed on 2014-10-11 (Reason: moved to release)
wpa (2.1-0ubuntu3) utopic; urgency=medium

  * debian/patches/git_update_scan_res_for_apscan_1_068e3877.patch: update
    scan results when using ap_scan=1; this avoids 4-way handshake failures
    while roaming. (LP: #1348105)
 -- Mathieu Trudel-Lapierre <email address hidden>   Mon, 22 Sep 2014 18:28:29 +0100

Available diffs

Superseded in utopic-release on 2014-09-26
Deleted in utopic-proposed on 2014-09-27 (Reason: moved to release)
wpa (2.1-0ubuntu2) utopic; urgency=medium

  * No-change rebuild with pkg-create-dbgsym 0.65 so that the full set of
    debug symbol packages are generated.
 -- Colin Watson <email address hidden>   Sat, 26 Jul 2014 22:26:29 +0100

Available diffs

Superseded in utopic-release on 2014-07-26
Published in trusty-release on 2014-03-05
Deleted in trusty-proposed (Reason: moved to release)
wpa (2.1-0ubuntu1) trusty; urgency=medium

  * New upstream release (LP: #1099755)
  * debian/get-orig-source: update for new git repository for the current
    hostap/wpasupplicant versions.
  * Dropped patches due to being applied upstream and included in the current
    source tarball:
    - debian/patches/11_wpa_gui_ftbfs_gcc_4_7.patch
    - debian/patches/13_human_readable_signal.patch
    - debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch
    - debian/patches/libnl3-includes.patch
  * debian/patches/git_accept_client_cert_from_server.patch: revert the commit:
    "OpenSSL: Do not accept SSL Client certificate for server", which breaks
    many AAA servers that include both client and server EKUs. Cherry-picked
    from hostap git commit b62d5b5.
 -- Mathieu Trudel-Lapierre <email address hidden>   Tue, 04 Mar 2014 16:13:24 -0500

Available diffs

Obsolete in saucy-updates on 2015-04-24
Deleted in saucy-proposed on 2015-04-28 (Reason: moved to -updates)
wpa (1.0-3ubuntu2.1) saucy-proposed; urgency=low

  * debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch:
    deinitialize the P2P context when the management interface gets removed for
    whatever reason, such as a suspend/resume cycle. (LP: #1210785)
 -- Mathieu Trudel-Lapierre <email address hidden>   Wed, 04 Dec 2013 11:20:38 -0500

Available diffs

Superseded in trusty-release on 2014-03-05
Deleted in trusty-proposed on 2014-03-07 (Reason: moved to release)
wpa (1.0-3ubuntu4) trusty; urgency=low

  * debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch:
    deinitialize the P2P context when the management interface gets removed for
    whatever reason, such as a suspend/resume cycle. (LP: #1210785)
 -- Mathieu Trudel-Lapierre <email address hidden>   Mon, 18 Nov 2013 20:31:00 -0500

Available diffs

Superseded in trusty-release on 2013-11-19
Deleted in trusty-proposed on 2013-11-20 (Reason: moved to release)
wpa (1.0-3ubuntu3) trusty; urgency=low

  * debian/config/wpasupplicant/linux: enable EAP-FAST (LP: #34982)
 -- Mathieu Trudel-Lapierre <email address hidden>   Wed, 30 Oct 2013 09:25:39 -0700

Available diffs

Superseded in trusty-release on 2013-11-03
Obsolete in saucy-release on 2015-04-24
Deleted in saucy-proposed on 2015-04-28 (Reason: moved to release)
wpa (1.0-3ubuntu2) saucy; urgency=low

  * debian/config/wpasupplicant/linux:
    - Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
    - Enable CONFIG_P2P (Wi-Fi Direct support).
 -- Mathieu Trudel-Lapierre <email address hidden>   Thu, 08 Aug 2013 10:20:17 -0400

Available diffs

Superseded in saucy-release on 2013-08-08
Obsolete in raring-release on 2015-04-24
Deleted in raring-proposed on 2015-04-27 (Reason: moved to release)
wpa (1.0-3ubuntu1) raring; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - Enable CONFIG_IBSS_RSN, so that we can turn back on "secure" adhoc
      support in NetworkManager using IBSS RSN (WPA2).
    - debian/wpasupplicant.postinst, debian/hostapd.postinst: Only move
      sendsigs.omit.d/*.pid if the target isn't the same as the source (as is
      the case when /lib/init/rw is a symlink to /run)
    - debian/patches/dbus-activation-cmdline.patch: have wpasupplicant create
      a pid file in /run/sendsigs.omit.d when activated by DBus.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.

Available diffs

Superseded in raring-release on 2012-12-07
Obsolete in quantal-release on 2015-04-24
wpa (1.0-2ubuntu5) quantal; urgency=low

  * debian/patches/session-ticket.patch: disable the TLS Session Ticket
    extension to fix auth with 802.1x PEAP on some hardware. (LP: #969343)
 -- Mathieu Trudel-Lapierre <email address hidden>   Wed, 12 Sep 2012 15:57:50 -0400

Available diffs

Superseded in quantal-release on 2012-09-13
wpa (1.0-2ubuntu4) quantal; urgency=low

  * Enable CONFIG_IBSS_RSN, so that we can turn back on "secure" adhoc support
    in NetworkManager using IBSS RSN (WPA2). (LP: #1046918)
 -- Mathieu Trudel-Lapierre <email address hidden>   Fri, 07 Sep 2012 15:49:45 -0400

Available diffs

Superseded in quantal-release on 2012-09-07
wpa (1.0-2ubuntu3) quantal; urgency=low

  * debian/patches/fix_driver_wext_for_broadcom_wl.patch: Drop the patch, it
    appears to break at least some scans with some Broadcom devices.
    (LP: #994739)
 -- Mathieu Trudel-Lapierre <email address hidden>   Wed, 01 Aug 2012 12:02:44 -0400

Available diffs

Superseded in quantal-release on 2012-08-01
wpa (1.0-2ubuntu2) quantal; urgency=low

  * debian/patches/fix_driver_wext_for_broadcom_wl.patch: Add a workaround for
    Broadcom wl driver's first failing scan (LP: #994739)
 -- Pau Oliva Fora (pof) <email address hidden>   Mon, 09 Jul 2012 16:44:32 +0200

Available diffs

Superseded in quantal-release on 2012-07-09
wpa (1.0-2ubuntu1) quantal; urgency=low

  * debian/wpasupplicant.postinst, debian/hostapd.postinst: Only move
    sendsigs.omit.d/*.pid if the target isn't the same as the source (as is
    the case when /lib/init/rw is a symlink to /run)
  * debian/patches/dbus-activation-cmdline.patch: have wpasupplicant create
    a pid file in /run/sendsigs.omit.d when activated by DBus.
 -- Mathieu Trudel-Lapierre <email address hidden>   Fri, 25 May 2012 14:07:55 -0400
144 of 44 results