** Changed in: wpa (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1879927
Title:
Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main)
Status in wpa package in Ubuntu:
Fix Released
Bug description:
Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main)
The Debian package carries some upstream cherry-picks that are nice to
have in Ubuntu, plus the packaging updates.
Sorry, I can't work on this merge myself.
These Ubuntu changes can be dropped because they are already in Debian:
* debian/patches/git_realtek_macrand.patch:
- backport an upstream patch to fix issues with some realtek cards
when MAC address randomization is enabled (lp: #1867908)
* SECURITY UPDATE: Incorrect indication of disconnection in certain
situations
- debian/patches/CVE-2019-16275.patch: silently ignore management
frame from unexpected source address in src/ap/drv_callbacks.c,
src/ap/ieee882_11.c.
- CVE-2019-16275
Remaining changes specific to Ubuntu:
* debian/patches/wpa_service_ignore-on-isolate.patch: add
IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
will not kill off wpa and cause wireless to be unavailable on first
boot.
* debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
Changelog entries since current groovy version 2:2.9-1ubuntu7:
wpa (2:2.9.0-13) unstable; urgency=medium
* Apply upstream patches:
- Avoid sending invalid mgmt frames at startup
- Increase introspection buffer size for D-Bus
-- Andrej Shadura <[email protected]> Tue, 19 May 2020 14:29:29
+0200
wpa (2:2.9.0-12) unstable; urgency=medium
* Add an upstream patch to fix the MAC randomisation issue with some cards
(LP: #1867908).
-- Andrej Shadura <[email protected]> Tue, 24 Mar 2020 11:13:16
+0100
wpa (2:2.9.0-11) unstable; urgency=medium
* Actually add autopkgtest for libwpa-client-dev and libwpa_test.c.
-- Andrej Shadura <[email protected]> Sat, 07 Mar 2020 13:18:19
+0100
wpa (2:2.9.0-10) unstable; urgency=medium
* Rename the package with the client library to libwpa-client-dev.
-- Andrej Shadura <[email protected]> Tue, 25 Feb 2020 20:19:52
+0100
wpa (2:2.9.0-9) unstable; urgency=medium
[ Terry Burton ]
* Build and install eapol_test in eapoltest package (Closes: #700870)
[ Didier Raboud ]
* Backport upstream patch to fix build with Debian's VERSION_STR.
[ Andrew Lee (李健秋) ]
* Build libwpa-dev binary package which contains a static
libwpa_client library and the wpa_ctrl header with an example program.
[ Andrej Shadura ]
* Add a patch to provide the BIT() macro locally in wpa_ctrl.h.
* Patch the example to use stddef.h and wpa_ctrl.h from the global location.
* Add an autopkgtest for libwpa-dev and libwpa_test.c.
-- Andrej Shadura <[email protected]> Tue, 25 Feb 2020 18:21:35
+0100
wpa (2:2.9.0-8) unstable; urgency=medium
* Reupload as 2.9.0 to undo an accidental experimental upload to
unstable.
-- Andrej Shadura <[email protected]> Sat, 22 Feb 2020 11:25:29
+0300
wpa (2:2.9-7) unstable; urgency=medium
* Apply upstream patches:
- trace: handle binutils bfd.h breakage
- Check for FT support when selecting FT suites (Closes: #942164)
-- Andrej Shadura <[email protected]> Sat, 15 Feb 2020 16:42:04
+0100
wpa (2:2.9-6) unstable; urgency=medium
[ Debian Janitor ]
* Use secure URI in Homepage field.
* Move source package lintian overrides to debian/source.
* Use canonical URL in Vcs-Browser.
* Rely on pre-initialized dpkg-architecture variables.
* Update standards version to 4.4.1, no changes needed.
[ Andrej Shadura ]
* Disable CONFIG_DRIVER_MACSEC_QCA on kfreebsd.
-- Andrej Shadura <[email protected]> Mon, 13 Jan 2020 16:28:58
+0100
wpa (2:2.9-5) unstable; urgency=medium
* Fix erroneously inverted logic in postinst.
-- Andrej Shadura <[email protected]> Mon, 13 Jan 2020 10:48:26
+0100
wpa (2:2.9-4) unstable; urgency=medium
[ Helmut Grohne ]
* Fix FTCBFS: Don’t export CC=cc (Closes: #921998).
[ Andrej Shadura ]
* Don’t act in hostapd.postinst if we’re running in a chrootless root.
* Apply an upstream patch:
- wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying.
-- Andrej Shadura <[email protected]> Mon, 13 Jan 2020 10:37:10
+0100
wpa (2:2.9-3) unstable; urgency=medium
* Add pkg.wpa.nogui and noudeb build profiles.
-- Andrej Shadura <[email protected]> Fri, 04 Oct 2019 11:47:15
+0200
wpa (2:2.9-2) unstable; urgency=medium
* SECURITY UPDATE:
- AP mode PMF disconnection protection bypass.
More details:
+ https://w1.fi/security/2019-7/
Closes: #940080 (CVE-2019-16275)
-- Andrej Shadura <[email protected]> Fri, 04 Oct 2019 10:11:47
+0200
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1879927/+subscriptions
--
Mailing list: https://launchpad.net/~touch-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help : https://help.launchpad.net/ListHelp