This bug was fixed in the package wpa - 2.1-0ubuntu1

---------------
wpa (2.1-0ubuntu1) trusty; urgency=medium

  * New upstream release (LP: #1099755)
  * debian/get-orig-source: update for new git repository for the current
    hostap/wpasupplicant versions.
  * Dropped patches due to being applied upstream and included in the current
    source tarball:
    - debian/patches/11_wpa_gui_ftbfs_gcc_4_7.patch
    - debian/patches/13_human_readable_signal.patch
    - debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch
    - debian/patches/libnl3-includes.patch
  * debian/patches/git_accept_client_cert_from_server.patch: revert the commit:
    "OpenSSL: Do not accept SSL Client certificate for server", which breaks
    many AAA servers that include both client and server EKUs. Cherry-picked
    from hostap git commit b62d5b5.
 -- Mathieu Trudel-Lapierre <[email protected]>   Tue, 04 Mar 2014 16:13:24 
-0500

** Changed in: wpa (Ubuntu)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1099755

Title:
  [FFE] Upgrade wpa_supplicant from 1.0 to 2.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1099755/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to