Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: wpa (Ubuntu)
       Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1512520

Title:
  New upstream release wpa 2.5

Status in wpa package in Ubuntu:
  Confirmed

Bug description:
  Upstream release 2.5 has come out recently, including a number of
  security bugfixes and additional channel selection and performance
  improvements to 5GHz networks. Please update to it :)

  Changelog:

  2015-09-27 - v2.5
        * fixed P2P validation of SSID element length before copying it
          [http://w1.fi/security/2015-1/] (CVE-2015-1863)
        * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
          [http://w1.fi/security/2015-2/] (CVE-2015-4141)
        * fixed WMM Action frame parser (AP mode)
          [http://w1.fi/security/2015-3/] (CVE-2015-4142)
        * fixed EAP-pwd peer missing payload length validation
          [http://w1.fi/security/2015-4/]
          (CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146)
        * fixed validation of WPS and P2P NFC NDEF record payload length
          [http://w1.fi/security/2015-5/]
        * nl80211:
          - added VHT configuration for IBSS
          - fixed vendor command handling to check OUI properly
          - allow driver-based roaming to change ESS
        * added AVG_BEACON_RSSI to SIGNAL_POLL output
        * wpa_cli: added tab completion for number of commands
        * removed unmaintained and not yet completed SChannel/CryptoAPI support
        * modified Extended Capabilities element use in Probe Request frames to
          include all cases if any of the values are non-zero
        * added support for dynamically creating/removing a virtual interface
          with interface_add/interface_remove
        * added support for hashed password (NtHash) in EAP-pwd peer
        * added support for memory-only PSK/passphrase (mem_only_psk=1 and
          CTRL-REQ/RSP-PSK_PASSPHRASE)
        * P2P
          - optimize scan frequencies list when re-joining a persistent group
          - fixed number of sequences with nl80211 P2P Device interface
          - added operating class 125 for P2P use cases (this allows 5 GHz
            channels 161 and 169 to be used if they are enabled in the current
            regulatory domain)
          - number of fixes to P2PS functionality
          - do not allow 40 MHz co-ex PRI/SEC switch to force MCC
          - extended support for preferred channel listing
        * D-Bus:
          - fixed WPS property of fi.w1.wpa_supplicant1.BSS interface
          - fixed PresenceRequest to use group interface
          - added new signals: FindStopped, WPS pbc-overlap,
            GroupFormationFailure, WPS timeout, InvitationReceived
          - added new methods: WPS Cancel, P2P Cancel, Reconnect, RemoveClient
          - added manufacturer info
        * added EAP-EKE peer support for deriving Session-Id
        * added wps_priority configuration parameter to set the default priority
          for all network profiles added by WPS
        * added support to request a scan with specific SSIDs with the SCAN
          command (optional "ssid <hexdump>" arguments)
        * removed support for WEP40/WEP104 as a group cipher with WPA/WPA2
        * fixed SAE group selection in an error case
        * modified SAE routines to be more robust and PWE generation to be
          stronger against timing attacks
        * added support for Brainpool Elliptic Curves with SAE
        * added support for CCMP-256 and GCMP-256 as group ciphers with FT
        * fixed BSS selection based on estimated throughput
        * added option to disable TLSv1.0 with OpenSSL
          (phase1="tls_disable_tlsv1_0=1")
        * added Fast Session Transfer (FST) module
        * fixed OpenSSL PKCS#12 extra certificate handling
        * fixed key derivation for Suite B 192-bit AKM (this breaks
          compatibility with the earlier version)
        * added RSN IE to Mesh Peering Open/Confirm frames
        * number of small fixes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1512520/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to