Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wpa (Ubuntu) |
Fix Released
|
Wishlist
|
Unassigned |
Bug Description
Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main)
The Debian package carries some upstream cherry-picks that are nice to have in Ubuntu, plus the packaging updates.
Sorry, I can't work on this merge myself.
These Ubuntu changes can be dropped because they are already in Debian:
* debian/
- backport an upstream patch to fix issues with some realtek cards
when MAC address randomization is enabled (lp: #1867908)
* SECURITY UPDATE: Incorrect indication of disconnection in certain
situations
- debian/
frame from unexpected source address in src/ap/
- CVE-2019-16275
Remaining changes specific to Ubuntu:
* debian/
IgnoreOnIs
will not kill off wpa and cause wireless to be unavailable on first
boot.
* debian/
extension to fix auth with 802.1x PEAP on some hardware.
Changelog entries since current groovy version 2:2.9-1ubuntu7:
wpa (2:2.9.0-13) unstable; urgency=medium
* Apply upstream patches:
- Avoid sending invalid mgmt frames at startup
- Increase introspection buffer size for D-Bus
-- Andrej Shadura <email address hidden> Tue, 19 May 2020 14:29:29 +0200
wpa (2:2.9.0-12) unstable; urgency=medium
* Add an upstream patch to fix the MAC randomisation issue with some cards
(LP: #1867908).
-- Andrej Shadura <email address hidden> Tue, 24 Mar 2020 11:13:16 +0100
wpa (2:2.9.0-11) unstable; urgency=medium
* Actually add autopkgtest for libwpa-client-dev and libwpa_test.c.
-- Andrej Shadura <email address hidden> Sat, 07 Mar 2020 13:18:19 +0100
wpa (2:2.9.0-10) unstable; urgency=medium
* Rename the package with the client library to libwpa-client-dev.
-- Andrej Shadura <email address hidden> Tue, 25 Feb 2020 20:19:52 +0100
wpa (2:2.9.0-9) unstable; urgency=medium
[ Terry Burton ]
* Build and install eapol_test in eapoltest package (Closes: #700870)
[ Didier Raboud ]
* Backport upstream patch to fix build with Debian's VERSION_STR.
[ Andrew Lee (李健秋) ]
* Build libwpa-dev binary package which contains a static
libwpa_client library and the wpa_ctrl header with an example program.
[ Andrej Shadura ]
* Add a patch to provide the BIT() macro locally in wpa_ctrl.h.
* Patch the example to use stddef.h and wpa_ctrl.h from the global location.
* Add an autopkgtest for libwpa-dev and libwpa_test.c.
-- Andrej Shadura <email address hidden> Tue, 25 Feb 2020 18:21:35 +0100
wpa (2:2.9.0-8) unstable; urgency=medium
* Reupload as 2.9.0 to undo an accidental experimental upload to unstable.
-- Andrej Shadura <email address hidden> Sat, 22 Feb 2020 11:25:29 +0300
wpa (2:2.9-7) unstable; urgency=medium
* Apply upstream patches:
- trace: handle binutils bfd.h breakage
- Check for FT support when selecting FT suites (Closes: #942164)
-- Andrej Shadura <email address hidden> Sat, 15 Feb 2020 16:42:04 +0100
wpa (2:2.9-6) unstable; urgency=medium
[ Debian Janitor ]
* Use secure URI in Homepage field.
* Move source package lintian overrides to debian/source.
* Use canonical URL in Vcs-Browser.
* Rely on pre-initialized dpkg-architecture variables.
* Update standards version to 4.4.1, no changes needed.
[ Andrej Shadura ]
* Disable CONFIG_
-- Andrej Shadura <email address hidden> Mon, 13 Jan 2020 16:28:58 +0100
wpa (2:2.9-5) unstable; urgency=medium
* Fix erroneously inverted logic in postinst.
-- Andrej Shadura <email address hidden> Mon, 13 Jan 2020 10:48:26 +0100
wpa (2:2.9-4) unstable; urgency=medium
[ Helmut Grohne ]
* Fix FTCBFS: Don’t export CC=cc (Closes: #921998).
[ Andrej Shadura ]
* Don’t act in hostapd.postinst if we’re running in a chrootless root.
* Apply an upstream patch:
- wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying.
-- Andrej Shadura <email address hidden> Mon, 13 Jan 2020 10:37:10 +0100
wpa (2:2.9-3) unstable; urgency=medium
* Add pkg.wpa.nogui and noudeb build profiles.
-- Andrej Shadura <email address hidden> Fri, 04 Oct 2019 11:47:15 +0200
wpa (2:2.9-2) unstable; urgency=medium
* SECURITY UPDATE:
- AP mode PMF disconnection protection bypass.
More details:
+ https:/
Closes: #940080 (CVE-2019-16275)
-- Andrej Shadura <email address hidden> Fri, 04 Oct 2019 10:11:47 +0200
summary: |
- Merge wpa 2:2.9.0-13 (main) from Debian unstable (main) + Please merge wpa 2:2.9.0-13 (main) from Debian unstable (main) |
Changed in wpa (Ubuntu): | |
status: | New → Fix Released |
Thanks but we are tools for tracking packages that need a merge, see https:/ /merges. ubuntu. com/main. html , there is no need to open bugs for those on launchpad