Public bug reported:

Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main)

The Debian package carries some upstream cherry-picks that are nice to
have in Ubuntu, plus the packaging updates.

Sorry, I can't work on this merge myself.

These Ubuntu changes can be dropped because they are already in Debian:
   * debian/patches/git_realtek_macrand.patch:
    - backport an upstream patch to fix issues with some realtek cards
      when MAC address randomization is enabled (lp: #1867908)
   * SECURITY UPDATE: Incorrect indication of disconnection in certain
     situations
     - debian/patches/CVE-2019-16275.patch: silently ignore management
       frame from unexpected source address in src/ap/drv_callbacks.c,
       src/ap/ieee882_11.c.
     - CVE-2019-16275

Remaining changes specific to Ubuntu:
   * debian/patches/wpa_service_ignore-on-isolate.patch: add
     IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
     will not kill off wpa and cause wireless to be unavailable on first
     boot.
   * debian/patches/session-ticket.patch: disable the TLS Session Ticket
     extension to fix auth with 802.1x PEAP on some hardware.

Changelog entries since current groovy version 2:2.9-1ubuntu7:

wpa (2:2.9.0-13) unstable; urgency=medium

  * Apply upstream patches:
    - Avoid sending invalid mgmt frames at startup
    - Increase introspection buffer size for D-Bus

 -- Andrej Shadura <andre...@debian.org>  Tue, 19 May 2020 14:29:29
+0200

wpa (2:2.9.0-12) unstable; urgency=medium

  * Add an upstream patch to fix the MAC randomisation issue with some cards
    (LP: #1867908).

 -- Andrej Shadura <andre...@debian.org>  Tue, 24 Mar 2020 11:13:16
+0100

wpa (2:2.9.0-11) unstable; urgency=medium

  * Actually add autopkgtest for libwpa-client-dev and libwpa_test.c.

 -- Andrej Shadura <andre...@debian.org>  Sat, 07 Mar 2020 13:18:19
+0100

wpa (2:2.9.0-10) unstable; urgency=medium

  * Rename the package with the client library to libwpa-client-dev.

 -- Andrej Shadura <andre...@debian.org>  Tue, 25 Feb 2020 20:19:52
+0100

wpa (2:2.9.0-9) unstable; urgency=medium

  [ Terry Burton ]
  * Build and install eapol_test in eapoltest package (Closes: #700870)

  [ Didier Raboud ]
  * Backport upstream patch to fix build with Debian's VERSION_STR.

  [ Andrew Lee (李健秋) ]
  * Build libwpa-dev binary package which contains a static
    libwpa_client library and the wpa_ctrl header with an example program.

  [ Andrej Shadura ]
  * Add a patch to provide the BIT() macro locally in wpa_ctrl.h.
  * Patch the example to use stddef.h and wpa_ctrl.h from the global location.
  * Add an autopkgtest for libwpa-dev and libwpa_test.c.

 -- Andrej Shadura <andre...@debian.org>  Tue, 25 Feb 2020 18:21:35
+0100

wpa (2:2.9.0-8) unstable; urgency=medium

  * Reupload as 2.9.0 to undo an accidental experimental upload to
unstable.

 -- Andrej Shadura <andre...@debian.org>  Sat, 22 Feb 2020 11:25:29
+0300

wpa (2:2.9-7) unstable; urgency=medium

  * Apply upstream patches:
    - trace: handle binutils bfd.h breakage
    - Check for FT support when selecting FT suites (Closes: #942164)

 -- Andrej Shadura <andre...@debian.org>  Sat, 15 Feb 2020 16:42:04
+0100

wpa (2:2.9-6) unstable; urgency=medium

  [ Debian Janitor ]
  * Use secure URI in Homepage field.
  * Move source package lintian overrides to debian/source.
  * Use canonical URL in Vcs-Browser.
  * Rely on pre-initialized dpkg-architecture variables.
  * Update standards version to 4.4.1, no changes needed.

  [ Andrej Shadura ]
  * Disable CONFIG_DRIVER_MACSEC_QCA on kfreebsd.

 -- Andrej Shadura <andre...@debian.org>  Mon, 13 Jan 2020 16:28:58
+0100

wpa (2:2.9-5) unstable; urgency=medium

  * Fix erroneously inverted logic in postinst.

 -- Andrej Shadura <andre...@debian.org>  Mon, 13 Jan 2020 10:48:26
+0100

wpa (2:2.9-4) unstable; urgency=medium

  [ Helmut Grohne ]
  * Fix FTCBFS: Don’t export CC=cc (Closes: #921998).

  [ Andrej Shadura ]
  * Don’t act in hostapd.postinst if we’re running in a chrootless root.
  * Apply an upstream patch:
    - wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying.

 -- Andrej Shadura <andre...@debian.org>  Mon, 13 Jan 2020 10:37:10
+0100

wpa (2:2.9-3) unstable; urgency=medium

  * Add pkg.wpa.nogui and noudeb build profiles.

 -- Andrej Shadura <andre...@debian.org>  Fri, 04 Oct 2019 11:47:15
+0200

wpa (2:2.9-2) unstable; urgency=medium

  * SECURITY UPDATE:
    - AP mode PMF disconnection protection bypass.
      More details:
       + https://w1.fi/security/2019-7/
      Closes: #940080 (CVE-2019-16275)

 -- Andrej Shadura <andre...@debian.org>  Fri, 04 Oct 2019 10:11:47
+0200

** Affects: wpa (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1879927

Title:
  Merge wpa 2:2.9.0-13 (main) from Debian unstable (main)

Status in wpa package in Ubuntu:
  New

Bug description:
  Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main)

  The Debian package carries some upstream cherry-picks that are nice to
  have in Ubuntu, plus the packaging updates.

  Sorry, I can't work on this merge myself.

  These Ubuntu changes can be dropped because they are already in Debian:
     * debian/patches/git_realtek_macrand.patch:
      - backport an upstream patch to fix issues with some realtek cards
        when MAC address randomization is enabled (lp: #1867908)
     * SECURITY UPDATE: Incorrect indication of disconnection in certain
       situations
       - debian/patches/CVE-2019-16275.patch: silently ignore management
         frame from unexpected source address in src/ap/drv_callbacks.c,
         src/ap/ieee882_11.c.
       - CVE-2019-16275

  Remaining changes specific to Ubuntu:
     * debian/patches/wpa_service_ignore-on-isolate.patch: add
       IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
       will not kill off wpa and cause wireless to be unavailable on first
       boot.
     * debian/patches/session-ticket.patch: disable the TLS Session Ticket
       extension to fix auth with 802.1x PEAP on some hardware.

  Changelog entries since current groovy version 2:2.9-1ubuntu7:

  wpa (2:2.9.0-13) unstable; urgency=medium

    * Apply upstream patches:
      - Avoid sending invalid mgmt frames at startup
      - Increase introspection buffer size for D-Bus

   -- Andrej Shadura <andre...@debian.org>  Tue, 19 May 2020 14:29:29
  +0200

  wpa (2:2.9.0-12) unstable; urgency=medium

    * Add an upstream patch to fix the MAC randomisation issue with some cards
      (LP: #1867908).

   -- Andrej Shadura <andre...@debian.org>  Tue, 24 Mar 2020 11:13:16
  +0100

  wpa (2:2.9.0-11) unstable; urgency=medium

    * Actually add autopkgtest for libwpa-client-dev and libwpa_test.c.

   -- Andrej Shadura <andre...@debian.org>  Sat, 07 Mar 2020 13:18:19
  +0100

  wpa (2:2.9.0-10) unstable; urgency=medium

    * Rename the package with the client library to libwpa-client-dev.

   -- Andrej Shadura <andre...@debian.org>  Tue, 25 Feb 2020 20:19:52
  +0100

  wpa (2:2.9.0-9) unstable; urgency=medium

    [ Terry Burton ]
    * Build and install eapol_test in eapoltest package (Closes: #700870)

    [ Didier Raboud ]
    * Backport upstream patch to fix build with Debian's VERSION_STR.

    [ Andrew Lee (李健秋) ]
    * Build libwpa-dev binary package which contains a static
      libwpa_client library and the wpa_ctrl header with an example program.

    [ Andrej Shadura ]
    * Add a patch to provide the BIT() macro locally in wpa_ctrl.h.
    * Patch the example to use stddef.h and wpa_ctrl.h from the global location.
    * Add an autopkgtest for libwpa-dev and libwpa_test.c.

   -- Andrej Shadura <andre...@debian.org>  Tue, 25 Feb 2020 18:21:35
  +0100

  wpa (2:2.9.0-8) unstable; urgency=medium

    * Reupload as 2.9.0 to undo an accidental experimental upload to
  unstable.

   -- Andrej Shadura <andre...@debian.org>  Sat, 22 Feb 2020 11:25:29
  +0300

  wpa (2:2.9-7) unstable; urgency=medium

    * Apply upstream patches:
      - trace: handle binutils bfd.h breakage
      - Check for FT support when selecting FT suites (Closes: #942164)

   -- Andrej Shadura <andre...@debian.org>  Sat, 15 Feb 2020 16:42:04
  +0100

  wpa (2:2.9-6) unstable; urgency=medium

    [ Debian Janitor ]
    * Use secure URI in Homepage field.
    * Move source package lintian overrides to debian/source.
    * Use canonical URL in Vcs-Browser.
    * Rely on pre-initialized dpkg-architecture variables.
    * Update standards version to 4.4.1, no changes needed.

    [ Andrej Shadura ]
    * Disable CONFIG_DRIVER_MACSEC_QCA on kfreebsd.

   -- Andrej Shadura <andre...@debian.org>  Mon, 13 Jan 2020 16:28:58
  +0100

  wpa (2:2.9-5) unstable; urgency=medium

    * Fix erroneously inverted logic in postinst.

   -- Andrej Shadura <andre...@debian.org>  Mon, 13 Jan 2020 10:48:26
  +0100

  wpa (2:2.9-4) unstable; urgency=medium

    [ Helmut Grohne ]
    * Fix FTCBFS: Don’t export CC=cc (Closes: #921998).

    [ Andrej Shadura ]
    * Don’t act in hostapd.postinst if we’re running in a chrootless root.
    * Apply an upstream patch:
      - wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying.

   -- Andrej Shadura <andre...@debian.org>  Mon, 13 Jan 2020 10:37:10
  +0100

  wpa (2:2.9-3) unstable; urgency=medium

    * Add pkg.wpa.nogui and noudeb build profiles.

   -- Andrej Shadura <andre...@debian.org>  Fri, 04 Oct 2019 11:47:15
  +0200

  wpa (2:2.9-2) unstable; urgency=medium

    * SECURITY UPDATE:
      - AP mode PMF disconnection protection bypass.
        More details:
         + https://w1.fi/security/2019-7/
        Closes: #940080 (CVE-2019-16275)

   -- Andrej Shadura <andre...@debian.org>  Fri, 04 Oct 2019 10:11:47
  +0200

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1879927/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to