[ubuntu/wily-proposed] wpa 2.4-0ubuntu1 (Accepted)

Mathieu Trudel-Lapierre mathieu-tl at ubuntu.com
Fri Jul 31 20:48:14 UTC 2015


wpa (2.4-0ubuntu1) wily; urgency=medium

  * New upstream release.
  * Merge with Debian unstable; remaining changes:
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method for
      requesting a firmware change when working with the Android HAL; this is
      used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
      being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required wifi
      headers for the HAL support.
    - debian/patches/dbus-available-sta.patch: Make the list of connected
      stations available on DBus for hotspot mode; along with some of the
      station properties, such as rx/tx packets, bytes, capabilities, etc.
    - debian/patches/CVE-2015-4141.patch: check chunk size: src/wps/httpread.c
      - CVE-2015-4141
    - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
      - CVE-2015-4142
    - debian/patches/CVE-2015-4143-4146.patch: check lengths in
        src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
      - CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
    - debian/config/wpasupplicant/linux:
      - Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
      - Enable CONFIG_P2P (Wi-Fi Direct support).
  * debian/patches/wpa_supplicant-MACsec-fix-build-failure-for-IEEE8021.patch,
    debian/patches/include-ieee802_11_common.c-in-wpa_supplicant-build-.patch,
    d/p/hostapd_fix-hostapd-operation-without-hw_mode-driver-data.patch:
    dropped patches included upstream.
  * Refreshed all patches.

Date: Mon, 27 Jul 2015 17:29:24 -0400
Changed-By: Mathieu Trudel-Lapierre <mathieu-tl at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 27 Jul 2015 17:29:24 -0400
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.4-0ubuntu1
Distribution: wily
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <mathieu-tl at ubuntu.com>
Description:
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Launchpad-Bugs-Fixed: 1209511
Changes:
 wpa (2.4-0ubuntu1) wily; urgency=medium
 .
   * New upstream release.
   * Merge with Debian unstable; remaining changes:
     - debian/patches/session-ticket.patch: disable the TLS Session Ticket
       extension to fix auth with 802.1x PEAP on some hardware.
     - debian/patches/android_hal_fw_path_change.patch: add a DBus method for
       requesting a firmware change when working with the Android HAL; this is
       used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL
       being enabled.
     - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
     - debian/control: Build-Depends on android-headers to get the required wifi
       headers for the HAL support.
     - debian/patches/dbus-available-sta.patch: Make the list of connected
       stations available on DBus for hotspot mode; along with some of the
       station properties, such as rx/tx packets, bytes, capabilities, etc.
     - debian/patches/CVE-2015-4141.patch: check chunk size: src/wps/httpread.c
       - CVE-2015-4141
     - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
       - CVE-2015-4142
     - debian/patches/CVE-2015-4143-4146.patch: check lengths in
         src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
       - CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
     - debian/config/wpasupplicant/linux:
       - Enable CONFIG_AP_MODE (AP mode support) (LP: #1209511).
       - Enable CONFIG_P2P (Wi-Fi Direct support).
   * debian/patches/wpa_supplicant-MACsec-fix-build-failure-for-IEEE8021.patch,
     debian/patches/include-ieee802_11_common.c-in-wpa_supplicant-build-.patch,
     d/p/hostapd_fix-hostapd-operation-without-hw_mode-driver-data.patch:
     dropped patches included upstream.
   * Refreshed all patches.
Checksums-Sha1:
 e6b92f2c1ce1c7e7a421f3cc945df3edf2d793c4 2558 wpa_2.4-0ubuntu1.dsc
 be9f0c01074cebe981a168eb747eab252eeff5f6 1834600 wpa_2.4.orig.tar.xz
 69f683d1c7a5a342d5c1453f4f49c4d5ba3433a5 84212 wpa_2.4-0ubuntu1.debian.tar.xz
Checksums-Sha256:
 2607af0dd82bebdeb7454fbb4bd7e6e318119a4049426728317c7be225d693f7 2558 wpa_2.4-0ubuntu1.dsc
 a1e4eda50796b2234a6cd2f00748bbe09f38f3f621919187289162faeb50b6b8 1834600 wpa_2.4.orig.tar.xz
 6036a983b1c6d707513695ee1ff823a7f7d6a200ffd89038e9dc5138b13ba0d9 84212 wpa_2.4-0ubuntu1.debian.tar.xz
Files:
 71a47db87b8ed862a47f43280c54481e 2558 net optional wpa_2.4-0ubuntu1.dsc
 6a77b9fe6838b4fca9b92cb22e14de1d 1834600 net optional wpa_2.4.orig.tar.xz
 7bd7b5e3eb38222510185785a822cb1a 84212 net optional wpa_2.4-0ubuntu1.debian.tar.xz
Original-Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=2s/H
-----END PGP SIGNATURE-----


More information about the Wily-changes mailing list