Change log for wpa package in Ubuntu
| 1 → 44 of 44 results | First • Previous • Next • Last |
wpa (2:2.4-1.1ubuntu1) bionic; urgency=medium
* Merge with Debian unstable; remaining changes:
- debian/patches/wpa_service_ignore-on-isolate.patch: add
IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
will not kill off wpa and cause wireless to be unavailable on first
boot.
- debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
- debian/patches/android_hal_fw_path_change.patch: add a DBus method
for requesting a firmware change when working with the Android HAL;
this is used to set a device in P2P or AP mode; conditional to
CONFIG_ANDROID_HAL being enabled.
- debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
- debian/control: Build-Depends on android-headers to get the required
wifi headers for the HAL support.
- debian/patches/dbus-available-sta.patch: Make the list of connected
stations available on DBus for hotspot mode; along with some of the
station properties, such as rx/tx packets, bytes, capabilities, etc.
Available diffs
- diff from 2.4-0ubuntu10 to 2:2.4-1.1ubuntu1 (28.9 KiB)
| Superseded in bionic-release on 2017-11-14 |
| Published in artful-release on 2017-10-17 |
| Deleted in artful-proposed (Reason: moved to release) |
wpa (2.4-0ubuntu10) artful; urgency=medium
* SECURITY UPDATE: Multiple issues in WPA protocol
- debian/patches/2017-1/*.patch: Add patches from Debian stretch
- CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
CVE-2017-13088
* SECURITY UPDATE: Denial of service issues
- debian/patches/2016-1/*.patch: Add patches from Debian stretch
- CVE-2016-4476
- CVE-2016-4477
-- Marc Deslauriers <email address hidden> Mon, 16 Oct 2017 07:41:21 -0400
Available diffs
- diff from 2.4-0ubuntu9 to 2.4-0ubuntu10 (15.7 KiB)
wpa (2.1-0ubuntu1.5) trusty-security; urgency=medium
* SECURITY UPDATE: Multiple issues in WPA protocol
- debian/patches/2017-1/*.patch: Add patches from Debian jessie
- CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
CVE-2017-13088
* SECURITY UPDATE: Denial of service issues
- debian/patches/2016-1/*.patch: Add patches from Debian jessie
- CVE-2016-4476
- CVE-2016-4477
-- Marc Deslauriers <email address hidden> Mon, 16 Oct 2017 08:20:18 -0400
Available diffs
wpa (2.4-0ubuntu6.2) xenial-security; urgency=medium
* SECURITY UPDATE: Multiple issues in WPA protocol
- debian/patches/2017-1/*.patch: Add patches from Debian stretch
- CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
CVE-2017-13088
* SECURITY UPDATE: Denial of service issues
- debian/patches/2016-1/*.patch: Add patches from Debian stretch
- CVE-2016-4476
- CVE-2016-4477
* This package does _not_ contain the changes from 2.4-0ubuntu6.1 in
xenial-proposed.
-- Marc Deslauriers <email address hidden> Mon, 16 Oct 2017 07:58:48 -0400
Available diffs
wpa (2.4-0ubuntu9.1) zesty-security; urgency=medium
* SECURITY UPDATE: Multiple issues in WPA protocol
- debian/patches/2017-1/*.patch: Add patches from Debian stretch
- CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
CVE-2017-13088
* SECURITY UPDATE: Denial of service issues
- debian/patches/2016-1/*.patch: Add patches from Debian stretch
- CVE-2016-4476
- CVE-2016-4477
-- Marc Deslauriers <email address hidden> Mon, 16 Oct 2017 07:41:21 -0400
Available diffs
| Deleted in xenial-proposed on 2017-10-20 (Reason: moved to -updates) |
wpa (2.4-0ubuntu6.1) xenial; urgency=medium
* debian/patches/wpa_service_ignore-on-isolate.patch: Add IgnoreOnIsolate=yes
so when isolating to default.target as oem-config does, we don't stop
wpasupplicant and cause wifi to be unavailable. (LP: #1576024)
-- Mathieu Trudel-Lapierre <email address hidden> Thu, 31 Aug 2017 14:31:25 -0400
Available diffs
- diff from 2.4-0ubuntu6 to 2.4-0ubuntu6.1 (719 bytes)
| Superseded in artful-release on 2017-10-17 |
| Published in zesty-release on 2017-03-18 |
| Deleted in zesty-proposed (Reason: moved to release) |
wpa (2.4-0ubuntu9) zesty; urgency=medium
* debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes
so that when switching "runlevels" in oem-config will not kill off wpa
and cause wireless to be unavailable on first boot. (LP: #1576024)
-- Mathieu Trudel-Lapierre <email address hidden> Mon, 13 Mar 2017 13:46:12 -0400
Available diffs
- diff from 2.4-0ubuntu8 to 2.4-0ubuntu9 (747 bytes)
| Superseded in zesty-release on 2017-03-18 |
| Published in yakkety-release on 2016-09-20 |
| Deleted in yakkety-proposed (Reason: moved to release) |
wpa (2.4-0ubuntu8) yakkety; urgency=medium * No-change rebuild for readline soname change. -- Matthias Klose <email address hidden> Sat, 17 Sep 2016 12:12:22 +0000
Available diffs
- diff from 2.4-0ubuntu7 to 2.4-0ubuntu8 (332 bytes)
| Superseded in yakkety-release on 2016-09-20 |
| Deleted in yakkety-proposed on 2016-09-21 (Reason: moved to release) |
wpa (2.4-0ubuntu7) yakkety; urgency=medium
* debian/ifupdown/functions.sh: Fix handling for "wpa-roam". Call ifquery
instead of directly parsing /run/*/ifstate files to work with current
ifupdown. (Closes: #545766, LP: #1545363)
-- Paul Donohue <email address hidden> Fri, 01 Jul 2016 09:16:21 +0200
Available diffs
- diff from 2.4-0ubuntu6 to 2.4-0ubuntu7 (872 bytes)
| Superseded in yakkety-release on 2016-07-01 |
| Published in xenial-release on 2016-01-20 |
| Deleted in xenial-proposed (Reason: moved to release) |
wpa (2.4-0ubuntu6) xenial; urgency=medium
* debian/patches/wpasupplicant_band_selection_aa517ae2.patch: add the last
missing 5 GHz band selection related cherry-pick from Debian that was not
included in wpa 2.4 (LP: #1517040)
-- Timo Jyrinki <email address hidden> Tue, 19 Jan 2016 12:36:00 +0200
Available diffs
- diff from 2.4-0ubuntu5 to 2.4-0ubuntu6 (1.0 KiB)
| Superseded in xenial-release on 2016-01-20 |
| Deleted in xenial-proposed on 2016-01-21 (Reason: moved to release) |
wpa (2.4-0ubuntu5) xenial; urgency=medium
* SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
- debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
- CVE-2015-5310
* SECURITY UPDATE: EAP-pwd missing last fragment length validation
- debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
validation in src/eap_peer/eap_pwd.c.
- debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
validation in src/eap_server/eap_server_pwd.c.
- CVE-2015-5315
* SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
message
- debian/patches/CVE-2015-5316.patch: fix error path in
src/eap_peer/eap_pwd.c.
- CVE-2015-5316
* SECURITY UPDATE: denial of service in NDEF record parser
- debian/patches/CVE-2015-8041.patch: validate payload lengths in
src/wps/ndef.c.
- CVE-2015-8041
-- Marc Deslauriers <email address hidden> Tue, 10 Nov 2015 13:38:25 -0500
Available diffs
- diff from 2.4-0ubuntu4 to 2.4-0ubuntu5 (3.5 KiB)
wpa (2.4-0ubuntu3.2) wily-security; urgency=medium
* SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
- debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
- CVE-2015-5310
* SECURITY UPDATE: EAP-pwd missing last fragment length validation
- debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
validation in src/eap_peer/eap_pwd.c.
- debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
validation in src/eap_server/eap_server_pwd.c.
- CVE-2015-5315
* SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
message
- debian/patches/CVE-2015-5316.patch: fix error path in
src/eap_peer/eap_pwd.c.
- CVE-2015-5316
* This package does _not_ contain the changes from 2.4-0ubuntu3.1 in
wily-proposed.
-- Marc Deslauriers <email address hidden> Mon, 09 Nov 2015 06:52:23 -0600
Available diffs
wpa (2.1-0ubuntu7.3) vivid-security; urgency=medium
* SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
- debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
- CVE-2015-5310
* SECURITY UPDATE: EAP-pwd missing last fragment length validation
- debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
validation in src/eap_peer/eap_pwd.c.
- debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
validation in src/eap_server/eap_server_pwd.c.
- CVE-2015-5315
-- Marc Deslauriers <email address hidden> Mon, 09 Nov 2015 07:22:31 -0600
Available diffs
wpa (2.1-0ubuntu1.4) trusty-security; urgency=medium
* SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
- debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
- CVE-2015-5310
* SECURITY UPDATE: EAP-pwd missing last fragment length validation
- debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
validation in src/eap_peer/eap_pwd.c.
- debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
validation in src/eap_server/eap_server_pwd.c.
- CVE-2015-5315
-- Marc Deslauriers <email address hidden> Mon, 09 Nov 2015 07:23:28 -0600
Available diffs
| Deleted in wily-proposed on 2015-11-18 (Reason: moved to -updates) |
wpa (2.4-0ubuntu3.1) wily-proposed; urgency=medium
* Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume
before/after suspend, like the pm-utils hook. In some cases this brings
back missing Wifi connection after resuming. (LP: #1422143)
-- Martin Pitt <email address hidden> Mon, 26 Oct 2015 14:24:30 +0100
Available diffs
- diff from 2.4-0ubuntu3 to 2.4-0ubuntu3.1 (679 bytes)
| Superseded in xenial-release on 2015-11-11 |
| Deleted in xenial-proposed on 2015-11-12 (Reason: moved to release) |
wpa (2.4-0ubuntu4) xenial; urgency=medium
* Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume
before/after suspend, like the pm-utils hook. In some cases this brings
back missing Wifi connection after resuming. (LP: #1422143)
-- Martin Pitt <email address hidden> Mon, 26 Oct 2015 14:24:30 +0100
Available diffs
- diff from 2.4-0ubuntu3 to 2.4-0ubuntu4 (674 bytes)
| Superseded in xenial-release on 2015-10-26 |
| Published in wily-release on 2015-10-07 |
| Deleted in wily-proposed (Reason: moved to release) |
wpa (2.4-0ubuntu3) wily; urgency=medium
* debian/patches/dbus-fix-operations-for-p2p-mgmt.patch: fix operations
when P2P management interface is used (LP: #1482439)
-- Ricardo Salveti de Araujo <email address hidden> Wed, 07 Oct 2015 10:21:39 -0300
Available diffs
- diff from 2.4-0ubuntu2 to 2.4-0ubuntu3 (2.8 KiB)
| Superseded in wily-release on 2015-10-07 |
| Deleted in wily-proposed on 2015-10-09 (Reason: moved to release) |
wpa (2.4-0ubuntu2) wily; urgency=medium
* debian/config/wpasupplicant/linux:
- Reduce the delta to Debian by removing the double setting of CONFIG_AP
and CONFIG_P2P. The only actual delta is CONFIG_ANDROID_HAL.
-- Timo Jyrinki <email address hidden> Mon, 03 Aug 2015 22:03:51 +0300
Available diffs
- diff from 2.4-0ubuntu1 to 2.4-0ubuntu2 (562 bytes)
| Superseded in wily-release on 2015-08-18 |
| Deleted in wily-proposed on 2015-08-20 (Reason: moved to release) |
wpa (2.4-0ubuntu1) wily; urgency=medium
* New upstream release.
* Merge with Debian unstable; remaining changes:
- debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
- debian/patches/android_hal_fw_path_change.patch: add a DBus method for
requesting a firmware change when working with the Android HAL; this is
used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
being enabled.
- debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
- debian/control: Build-Depends on android-headers to get the required wifi
headers for the HAL support.
- debian/patches/dbus-available-sta.patch: Make the list of connected
stations available on DBus for hotspot mode; along with some of the
station properties, such as rx/tx packets, bytes, capabilities, etc.
- debian/patches/CVE-2015-4141.patch: check chunk size: src/wps/httpread.c
- CVE-2015-4141
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
- debian/config/wpasupplicant/linux:
- Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
- Enable CONFIG_P2P (Wi-Fi Direct support).
* debian/patches/wpa_supplicant-MACsec-fix-build-failure-for-IEEE8021.patch,
debian/patches/include-ieee802_11_common.c-in-wpa_supplicant-build-.patch,
d/p/hostapd_fix-hostapd-operation-without-hw_mode-driver-data.patch:
dropped patches included upstream.
* Refreshed all patches.
-- Mathieu Trudel-Lapierre <email address hidden> Mon, 27 Jul 2015 17:29:24 -0400
Available diffs
- diff from 2.1-0ubuntu8 to 2.4-0ubuntu1 (993.2 KiB)
| Superseded in wily-release on 2015-08-03 |
| Deleted in wily-proposed on 2015-08-04 (Reason: moved to release) |
wpa (2.1-0ubuntu8) wily; urgency=medium
* SECURITY UPDATE: memcpy overflow in P2P functionality
- debian/patches/CVE-2015-1863.patch: validate SID element length in
src/p2p/p2p.c.
- CVE-2015-1863
* SECURITY UPDATE: denial of service via WPS UPnP
- debian/patches/CVE-2015-4141.patch: check chunk size in
src/wps/httpread.c.
- CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143
- CVE-2015-4144
- CVE-2015-4145
- CVE-2015-4146
-- Marc Deslauriers <email address hidden> Mon, 15 Jun 2015 10:21:54 -0400
Available diffs
- diff from 2.1-0ubuntu7 to 2.1-0ubuntu8 (4.2 KiB)
wpa (2.1-0ubuntu4.2) utopic-security; urgency=medium
* SECURITY UPDATE: denial of service via WPS UPnP
- debian/patches/CVE-2015-4141.patch: check chunk size in
src/wps/httpread.c.
- CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143
- CVE-2015-4144
- CVE-2015-4145
- CVE-2015-4146
-- Marc Deslauriers <email address hidden> Mon, 15 Jun 2015 10:33:55 -0400
Available diffs
wpa (2.1-0ubuntu1.3) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service via WPS UPnP
- debian/patches/CVE-2015-4141.patch: check chunk size in
src/wps/httpread.c.
- CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143
- CVE-2015-4144
- CVE-2015-4145
- CVE-2015-4146
-- Marc Deslauriers <email address hidden> Mon, 15 Jun 2015 10:34:37 -0400
Available diffs
wpa (2.1-0ubuntu7.2) vivid-security; urgency=medium
* SECURITY UPDATE: denial of service via WPS UPnP
- debian/patches/CVE-2015-4141.patch: check chunk size in
src/wps/httpread.c.
- CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143
- CVE-2015-4144
- CVE-2015-4145
- CVE-2015-4146
-- Marc Deslauriers <email address hidden> Mon, 15 Jun 2015 10:32:33 -0400
Available diffs
wpa (2.1-0ubuntu7.1) vivid-security; urgency=medium
* SECURITY UPDATE: memcpy overflow in P2P functionality
- debian/patches/CVE-2015-1863.patch: validate SID element length in
src/p2p/p2p.c.
- CVE-2015-1863
-- Marc Deslauriers <email address hidden> Mon, 20 Apr 2015 13:42:02 -0400
Available diffs
wpa (2.1-0ubuntu4.1) utopic-security; urgency=medium
* SECURITY UPDATE: memcpy overflow in P2P functionality
- debian/patches/CVE-2015-1863.patch: validate SID element length in
src/p2p/p2p.c.
- CVE-2015-1863
-- Marc Deslauriers <email address hidden> Mon, 20 Apr 2015 13:44:35 -0400
Available diffs
wpa (2.1-0ubuntu1.2) trusty-security; urgency=medium
* SECURITY UPDATE: memcpy overflow in P2P functionality
- debian/patches/CVE-2015-1863.patch: validate SID element length in
src/p2p/p2p.c.
- CVE-2015-1863
-- Marc Deslauriers <email address hidden> Mon, 20 Apr 2015 13:45:07 -0400
Available diffs
| Superseded in wily-release on 2015-06-24 |
| Published in vivid-release on 2015-03-27 |
| Deleted in vivid-proposed (Reason: moved to release) |
wpa (2.1-0ubuntu7) vivid; urgency=medium
Cherry-pick from Debian svn:
* Add wpasupplicant_fix-systemd-unit-dependencies.patch: Fix systemd unit
dependencies for wpasupplicant, it needs to be started before the network
target (Closes: 780552, LP: #1431774).
-- Martin Pitt <email address hidden> Fri, 27 Mar 2015 14:07:35 +0100
Available diffs
- diff from 2.1-0ubuntu6 to 2.1-0ubuntu7 (793 bytes)
| Superseded in vivid-release on 2015-03-27 |
| Deleted in vivid-proposed on 2015-03-28 (Reason: moved to release) |
wpa (2.1-0ubuntu6) vivid; urgency=medium
* debian/patches/dbus-available-sta.patch: Make the list of connected
stations available on DBus for hotspot mode; along with some of the
station properties, such as rx/tx packets, bytes, capabilities, etc.
-- Mathieu Trudel-Lapierre <email address hidden> Fri, 19 Dec 2014 13:29:30 -0500
Available diffs
- diff from 2.1-0ubuntu5 to 2.1-0ubuntu6 (4.9 KiB)
| Superseded in vivid-release on 2014-12-19 |
| Deleted in vivid-proposed on 2014-12-21 (Reason: moved to release) |
wpa (2.1-0ubuntu5) vivid; urgency=medium
* debian/patches/android_hal_fw_path_change.patch: add a DBus method for
requesting a firmware change when working with the Android HAL; this is
used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
being enabled.
* debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
* debian/control: Build-Depends on android-headers to get the required wifi
headers for the HAL support.
-- Mathieu Trudel-Lapierre <email address hidden> Mon, 08 Dec 2014 21:05:25 -0500
Available diffs
- diff from 2.1-0ubuntu4 to 2.1-0ubuntu5 (2.7 KiB)
| Superseded in vivid-release on 2014-12-12 |
| Obsolete in utopic-release on 2016-11-03 |
| Deleted in utopic-proposed on 2016-11-03 (Reason: moved to release) |
wpa (2.1-0ubuntu4) utopic; urgency=medium
* SECURITY UPDATE: arbitrary command execution via unsanitized string
passed to action scripts by wpa_cli and hostapd_cli
- debian/patches/CVE-2014-3686.patch: added os_exec() helper to
src/utils/os.h, src/utils/os_unix.c, src/utils/os_win32.c,
use instead of system() in wpa_supplicant/wpa_cli.c,
hostapd/hostapd_cli.c.
- CVE-2014-3686
-- Marc Deslauriers <email address hidden> Fri, 10 Oct 2014 09:15:39 -0400
Available diffs
- diff from 2.1-0ubuntu3 to 2.1-0ubuntu4 (1.9 KiB)
wpa (2.1-0ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary command execution via unsanitized string
passed to action scripts by wpa_cli and hostapd_cli
- debian/patches/CVE-2014-3686.patch: added os_exec() helper to
src/utils/os.h, src/utils/os_unix.c, src/utils/os_win32.c,
use instead of system() in wpa_supplicant/wpa_cli.c,
hostapd/hostapd_cli.c.
- CVE-2014-3686
-- Marc Deslauriers <email address hidden> Fri, 10 Oct 2014 09:21:44 -0400
Available diffs
| Superseded in utopic-release on 2014-10-10 |
| Deleted in utopic-proposed on 2014-10-11 (Reason: moved to release) |
wpa (2.1-0ubuntu3) utopic; urgency=medium
* debian/patches/git_update_scan_res_for_apscan_1_068e3877.patch: update
scan results when using ap_scan=1; this avoids 4-way handshake failures
while roaming. (LP: #1348105)
-- Mathieu Trudel-Lapierre <email address hidden> Mon, 22 Sep 2014 18:28:29 +0100
Available diffs
- diff from 2.1-0ubuntu2 to 2.1-0ubuntu3 (1.4 KiB)
| Superseded in utopic-release on 2014-09-26 |
| Deleted in utopic-proposed on 2014-09-27 (Reason: moved to release) |
wpa (2.1-0ubuntu2) utopic; urgency=medium
* No-change rebuild with pkg-create-dbgsym 0.65 so that the full set of
debug symbol packages are generated.
-- Colin Watson <email address hidden> Sat, 26 Jul 2014 22:26:29 +0100
Available diffs
- diff from 2.1-0ubuntu1 to 2.1-0ubuntu2 (366 bytes)
| Superseded in utopic-release on 2014-07-26 |
| Published in trusty-release on 2014-03-05 |
| Deleted in trusty-proposed (Reason: moved to release) |
wpa (2.1-0ubuntu1) trusty; urgency=medium * New upstream release (LP: #1099755) * debian/get-orig-source: update for new git repository for the current hostap/wpasupplicant versions. * Dropped patches due to being applied upstream and included in the current source tarball: - debian/patches/11_wpa_gui_ftbfs_gcc_4_7.patch - debian/patches/13_human_readable_signal.patch - debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch - debian/patches/libnl3-includes.patch * debian/patches/git_accept_client_cert_from_server.patch: revert the commit: "OpenSSL: Do not accept SSL Client certificate for server", which breaks many AAA servers that include both client and server EKUs. Cherry-picked from hostap git commit b62d5b5. -- Mathieu Trudel-Lapierre <email address hidden> Tue, 04 Mar 2014 16:13:24 -0500
Available diffs
- diff from 1.0-3ubuntu4 to 2.1-0ubuntu1 (1016.0 KiB)
| Obsolete in saucy-updates on 2015-04-24 |
| Deleted in saucy-proposed on 2015-04-28 (Reason: moved to -updates) |
wpa (1.0-3ubuntu2.1) saucy-proposed; urgency=low
* debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch:
deinitialize the P2P context when the management interface gets removed for
whatever reason, such as a suspend/resume cycle. (LP: #1210785)
-- Mathieu Trudel-Lapierre <email address hidden> Wed, 04 Dec 2013 11:20:38 -0500
Available diffs
- diff from 1.0-3ubuntu2 to 1.0-3ubuntu2.1 (1.7 KiB)
| Superseded in trusty-release on 2014-03-05 |
| Deleted in trusty-proposed on 2014-03-07 (Reason: moved to release) |
wpa (1.0-3ubuntu4) trusty; urgency=low
* debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch:
deinitialize the P2P context when the management interface gets removed for
whatever reason, such as a suspend/resume cycle. (LP: #1210785)
-- Mathieu Trudel-Lapierre <email address hidden> Mon, 18 Nov 2013 20:31:00 -0500
Available diffs
- diff from 1.0-3ubuntu3 to 1.0-3ubuntu4 (1.7 KiB)
| Superseded in trusty-release on 2013-11-19 |
| Deleted in trusty-proposed on 2013-11-20 (Reason: moved to release) |
wpa (1.0-3ubuntu3) trusty; urgency=low * debian/config/wpasupplicant/linux: enable EAP-FAST (LP: #34982) -- Mathieu Trudel-Lapierre <email address hidden> Wed, 30 Oct 2013 09:25:39 -0700
Available diffs
- diff from 1.0-3ubuntu2 to 1.0-3ubuntu3 (520 bytes)
| Superseded in trusty-release on 2013-11-03 |
| Obsolete in saucy-release on 2015-04-24 |
| Deleted in saucy-proposed on 2015-04-28 (Reason: moved to release) |
wpa (1.0-3ubuntu2) saucy; urgency=low
* debian/config/wpasupplicant/linux:
- Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
- Enable CONFIG_P2P (Wi-Fi Direct support).
-- Mathieu Trudel-Lapierre <email address hidden> Thu, 08 Aug 2013 10:20:17 -0400
Available diffs
- diff from 1.0-3ubuntu1 to 1.0-3ubuntu2 (526 bytes)
| Superseded in saucy-release on 2013-08-08 |
| Obsolete in raring-release on 2015-04-24 |
| Deleted in raring-proposed on 2015-04-27 (Reason: moved to release) |
wpa (1.0-3ubuntu1) raring; urgency=low
* Merge from Debian unstable. Remaining changes:
- Enable CONFIG_IBSS_RSN, so that we can turn back on "secure" adhoc
support in NetworkManager using IBSS RSN (WPA2).
- debian/wpasupplicant.postinst, debian/hostapd.postinst: Only move
sendsigs.omit.d/*.pid if the target isn't the same as the source (as is
the case when /lib/init/rw is a symlink to /run)
- debian/patches/dbus-activation-cmdline.patch: have wpasupplicant create
a pid file in /run/sendsigs.omit.d when activated by DBus.
- debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
Available diffs
- diff from 1.0-2ubuntu5 to 1.0-3ubuntu1 (2.4 KiB)
wpa (1.0-2ubuntu5) quantal; urgency=low
* debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware. (LP: #969343)
-- Mathieu Trudel-Lapierre <email address hidden> Wed, 12 Sep 2012 15:57:50 -0400
Available diffs
- diff from 1.0-2ubuntu4 to 1.0-2ubuntu5 (922 bytes)
| Superseded in quantal-release on 2012-09-13 |
wpa (1.0-2ubuntu4) quantal; urgency=low
* Enable CONFIG_IBSS_RSN, so that we can turn back on "secure" adhoc support
in NetworkManager using IBSS RSN (WPA2). (LP: #1046918)
-- Mathieu Trudel-Lapierre <email address hidden> Fri, 07 Sep 2012 15:49:45 -0400
Available diffs
- diff from 1.0-2ubuntu3 to 1.0-2ubuntu4 (553 bytes)
| Superseded in quantal-release on 2012-09-07 |
wpa (1.0-2ubuntu3) quantal; urgency=low
* debian/patches/fix_driver_wext_for_broadcom_wl.patch: Drop the patch, it
appears to break at least some scans with some Broadcom devices.
(LP: #994739)
-- Mathieu Trudel-Lapierre <email address hidden> Wed, 01 Aug 2012 12:02:44 -0400
Available diffs
- diff from 1.0-2ubuntu2 to 1.0-2ubuntu3 (1.5 KiB)
| Superseded in quantal-release on 2012-08-01 |
wpa (1.0-2ubuntu2) quantal; urgency=low
* debian/patches/fix_driver_wext_for_broadcom_wl.patch: Add a workaround for
Broadcom wl driver's first failing scan (LP: #994739)
-- Pau Oliva Fora (pof) <email address hidden> Mon, 09 Jul 2012 16:44:32 +0200
Available diffs
- diff from 1.0-2ubuntu1 to 1.0-2ubuntu2 (1.5 KiB)
| Superseded in quantal-release on 2012-07-09 |
wpa (1.0-2ubuntu1) quantal; urgency=low
* debian/wpasupplicant.postinst, debian/hostapd.postinst: Only move
sendsigs.omit.d/*.pid if the target isn't the same as the source (as is
the case when /lib/init/rw is a symlink to /run)
* debian/patches/dbus-activation-cmdline.patch: have wpasupplicant create
a pid file in /run/sendsigs.omit.d when activated by DBus.
-- Mathieu Trudel-Lapierre <email address hidden> Fri, 25 May 2012 14:07:55 -0400
| 1 → 44 of 44 results | First • Previous • Next • Last |

