This bug was fixed in the package wpa - 2.1-0ubuntu1
---------------
wpa (2.1-0ubuntu1) trusty; urgency=medium
* New upstream release (LP: #1099755)
* debian/get-orig-source: update for new git repository for the current
hostap/wpasupplicant versions.
* Dropped patches due to being applied upstream and included in the current
source tarball:
- debian/patches/11_wpa_gui_ftbfs_gcc_4_7.patch
- debian/patches/13_human_readable_signal.patch
- debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch
- debian/patches/libnl3-includes.patch
* debian/patches/git_accept_client_cert_from_server.patch: revert the commit:
"OpenSSL: Do not accept SSL Client certificate for server", which breaks
many AAA servers that include both client and server EKUs. Cherry-picked
from hostap git commit b62d5b5.
-- Mathieu Trudel-Lapierre <[email protected]> Tue, 04 Mar 2014 16:13:24
-0500
** Changed in: wpa (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1099755
Title:
[FFE] Upgrade wpa_supplicant from 1.0 to 2.1
Status in “wpa” package in Ubuntu:
Fix Released
Status in “wpa” package in Debian:
New
Bug description:
New releases of wpa_supplicant are available: 1.1 (released
2012-11-06) and 2.0 (released 2013-01-12) and 2.1 (released
2014-02-04).
2.1 contains a number of bugfixes relevant to frequent disconnects
some might be seeing on networks where there is a lot of roaming, some
IBSS (ad-hoc) fixes, etc.
http://lists.shmoo.com/pipermail/hostap/2014-February/029440.html
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1099755/+subscriptions
--
Mailing list: https://launchpad.net/~desktop-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help : https://help.launchpad.net/ListHelp