[ubuntu/wily-proposed] wpa 2.4-0ubuntu1 (Accepted)
Mathieu Trudel-Lapierre
mathieu-tl at ubuntu.com
Fri Jul 31 20:48:14 UTC 2015
wpa (2.4-0ubuntu1) wily; urgency=medium
* New upstream release.
* Merge with Debian unstable; remaining changes:
- debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
- debian/patches/android_hal_fw_path_change.patch: add a DBus method for
requesting a firmware change when working with the Android HAL; this is
used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
being enabled.
- debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
- debian/control: Build-Depends on android-headers to get the required wifi
headers for the HAL support.
- debian/patches/dbus-available-sta.patch: Make the list of connected
stations available on DBus for hotspot mode; along with some of the
station properties, such as rx/tx packets, bytes, capabilities, etc.
- debian/patches/CVE-2015-4141.patch: check chunk size: src/wps/httpread.c
- CVE-2015-4141
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
- debian/config/wpasupplicant/linux:
- Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
- Enable CONFIG_P2P (Wi-Fi Direct support).
* debian/patches/wpa_supplicant-MACsec-fix-build-failure-for-IEEE8021.patch,
debian/patches/include-ieee802_11_common.c-in-wpa_supplicant-build-.patch,
d/p/hostapd_fix-hostapd-operation-without-hw_mode-driver-data.patch:
dropped patches included upstream.
* Refreshed all patches.
Date: Mon, 27 Jul 2015 17:29:24 -0400
Changed-By: Mathieu Trudel-Lapierre <mathieu-tl at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 27 Jul 2015 17:29:24 -0400
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.4-0ubuntu1
Distribution: wily
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <mathieu-tl at ubuntu.com>
Description:
hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
wpagui - graphical user interface for wpa_supplicant
wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Launchpad-Bugs-Fixed: 1209511
Changes:
wpa (2.4-0ubuntu1) wily; urgency=medium
.
* New upstream release.
* Merge with Debian unstable; remaining changes:
- debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
- debian/patches/android_hal_fw_path_change.patch: add a DBus method for
requesting a firmware change when working with the Android HAL; this is
used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
being enabled.
- debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
- debian/control: Build-Depends on android-headers to get the required wifi
headers for the HAL support.
- debian/patches/dbus-available-sta.patch: Make the list of connected
stations available on DBus for hotspot mode; along with some of the
station properties, such as rx/tx packets, bytes, capabilities, etc.
- debian/patches/CVE-2015-4141.patch: check chunk size: src/wps/httpread.c
- CVE-2015-4141
- debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
- CVE-2015-4142
- debian/patches/CVE-2015-4143-4146.patch: check lengths in
src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
- CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
- debian/config/wpasupplicant/linux:
- Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
- Enable CONFIG_P2P (Wi-Fi Direct support).
* debian/patches/wpa_supplicant-MACsec-fix-build-failure-for-IEEE8021.patch,
debian/patches/include-ieee802_11_common.c-in-wpa_supplicant-build-.patch,
d/p/hostapd_fix-hostapd-operation-without-hw_mode-driver-data.patch:
dropped patches included upstream.
* Refreshed all patches.
Checksums-Sha1:
e6b92f2c1ce1c7e7a421f3cc945df3edf2d793c4 2558 wpa_2.4-0ubuntu1.dsc
be9f0c01074cebe981a168eb747eab252eeff5f6 1834600 wpa_2.4.orig.tar.xz
69f683d1c7a5a342d5c1453f4f49c4d5ba3433a5 84212 wpa_2.4-0ubuntu1.debian.tar.xz
Checksums-Sha256:
2607af0dd82bebdeb7454fbb4bd7e6e318119a4049426728317c7be225d693f7 2558 wpa_2.4-0ubuntu1.dsc
a1e4eda50796b2234a6cd2f00748bbe09f38f3f621919187289162faeb50b6b8 1834600 wpa_2.4.orig.tar.xz
6036a983b1c6d707513695ee1ff823a7f7d6a200ffd89038e9dc5138b13ba0d9 84212 wpa_2.4-0ubuntu1.debian.tar.xz
Files:
71a47db87b8ed862a47f43280c54481e 2558 net optional wpa_2.4-0ubuntu1.dsc
6a77b9fe6838b4fca9b92cb22e14de1d 1834600 net optional wpa_2.4.orig.tar.xz
7bd7b5e3eb38222510185785a822cb1a 84212 net optional wpa_2.4-0ubuntu1.debian.tar.xz
Original-Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBAgAGBQJVu9zdAAoJEMfaqUbclcpa5goP/0SHEXLmptQiMqqrSmvUrSk0
+egGxuwzQ1f8pkcwR2QcCUjrlIlXB+l0jpkjZGZGlejjFfxjFwYHc46rjKysxgEj
oWO/ptC9R4a8vh/tFf0K/Te7vuT4AQYVPv8yKHNGq60o3Mml9Y4mG7Y0LSQnrcoW
dKjaM9uHpamfECBYKJDJ7Lj36Z3tsBOKxqUAF3yAQj8GygSBns5eaqRVCnNLYrAA
0g5Ha4Napdfq2qPRvmqYhAE2ho/IEM7NZ4bo2/IS7uj00dtl3d53LKIlsvckilAq
JfmSZV5nx2V2Z1h/LsNY06PdS5AWKELLPoVWHLsSVn7VzpRmddRjUIL2FzT4NY3n
eMF0S2ocMhi1l8VzGt7d89rhC93NT2pU9LoRr8QahJTD/EWKbICwInxdtsYdDHu/
r8goaTMJmB93IY0JrWODGIRRqaf8bYhguwb6BgAJVf0Y50qd5bQnCwq1iSuUxCOs
ddmQ5F6rlEB4oenCeZ1DfkVIzjzBZeeF222c6RCdtqIvxZk5wEju51h4mBuUZLbZ
09iJfVG2Hs73dNlmVWhTSRLdvy3ySepBSZOeqkzMsKCAp9dfNU/K9lRDIHZHawmi
Wu/6kXYjMXRABoF86KktAiRMINvzRq/tJOBZPtC+PuIYjq6NE7FKZbkUckWfWgei
CPj0Es7miuAHq/e4M1PP
=2s/H
-----END PGP SIGNATURE-----
More information about the Wily-changes
mailing list