Back to wpa PTS page

Accepted wpa 2.5-2+v2.4-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 05 Aug 2016 20:45:14 +0200
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.5-2+v2.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>
Changed-By: Andrew Shadura <andrewsh@debian.org>
Description:
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 545766 729934 766746 785579 806889 823171 823411 827253
Launchpad-Bugs-Fixed: 1422143 1482439 1545363
Changes:
 wpa (2.5-2+v2.4-1) unstable; urgency=medium
 .
   [ Ricardo Salveti de Araujo ]
   * debian/patches/dbus-fix-operations-for-p2p-mgmt.patch: fix operations
     when P2P management interface is used (LP: #1482439)
 .
   [ Stefan Lippers-Hollmann ]
   * wpasupplicant: install systemd unit (Closes: #766746).
   * wpasupplicant: configure driver fallback for networkd.
   * import changelogs from the security queues.
   * move previous patch for CVE-2015-1863 into a new subdirectory,
     debian/patches/2015-1/.
   * replace the Debian specific patch "wpasupplicant: fix systemd unit
     dependencies" with a backport of its official upstream change "systemd:
     Order wpa_supplicant before network.target".
   * fix dependency odering when invoked with DBus, by making sure that DBus
     isn't shut down before wpa_supplicant, as that would also bring down
     wireless links which are still holding open NFS shares. Thanks to Facundo
     Gaich <facugaich@gmail.com> and Michael Biebl <biebl@debian.org>
     (Closes: #785579).
   * import NMU changelogs and integrate NMU changes.
   * Add patches to address CVE-2016-4476 and CVE-2016-4477, thanks to Salvatore
     Bonaccorso <carnil@debian.org> (Closes: #823411):
     - WPS: Reject a Credential with invalid passphrase
     - Reject psk parameter set with invalid passphrase character
     - Remove newlines from wpa_supplicant config network output
     - Reject SET_CRED commands with newline characters in the string values
     - Reject SET commands with newline characters in the string values
   * use --buildsystem=qmake_qt4 (available since dh 8.9.1) for debhelper
     (Closes: #823171).
   * fix clean target, by splitting the find call into individual searches.
   * building wpa in a current unstable chroot using debhelper >= 9.20151219
     will introduce automatic dbgsym packages, thereby indirectly providing
     the requested debug packages for stretch and upwards (Closes: #729934).
     Don't add a versioned build-dependency in order to avoid unnecessary
     complications with backports.
   * change Vcs-Browser location to prefer https, but keep the unsecure tag for
     Vcs-Svn, as there is no option allowing to pull from the svn+ssh://
     location without an alioth account, this only makes lintian partially happy
     in regards to vcs-field-uses-insecure-uri.
   * debian/*: fix spelling errors noticed by lintian.
   * drop the obsolete Debian menu entry for wpa_gui, according to the tech-ctte
     decision on #741573.
   * fix debian/get-orig-source for wpa 2.6~.
   * add debian/watch file for the custom tarball generation.
 .
   [ Paul Donohue ]
   * debian/ifupdown/functions.sh: Fix handling for "wpa-roam". Call ifquery
     instead of directly parsing /run/*/ifstate files to work with current
     ifupdown. (Closes: #545766, LP: #1545363)
 .
   [ Martin Pitt ]
   * Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume
     before/after suspend, like the pm-utils hook. In some cases this brings
     back missing Wifi connection after resuming. (LP: #1422143)
 .
   [ Andrew Shadura ]
   * New upstream release (Closes: #806889).
   * Refresh patches, drop patches applied upstream.
   * Fix pkcs11 OpenSSL engine initialisation (Closes: #827253).
   * Update Vcs-* to point to Git.
Checksums-Sha1:
 e6155988a383a34e69d314ca9ebf469b145486ee 2185 wpa_2.5-2+v2.4-1.dsc
 be9f0c01074cebe981a168eb747eab252eeff5f6 1834600 wpa_2.5-2+v2.4.orig.tar.xz
 3357f2c0320fcea7b5dd9f5a521afd0a4bd1c2c3 84828 wpa_2.5-2+v2.4-1.debian.tar.xz
Checksums-Sha256:
 e41104260ddc75a7960ac5d0b68607a752c920ebc21439fab58412732dde52c4 2185 wpa_2.5-2+v2.4-1.dsc
 a1e4eda50796b2234a6cd2f00748bbe09f38f3f621919187289162faeb50b6b8 1834600 wpa_2.5-2+v2.4.orig.tar.xz
 f15158f99c77665dd7f6f6f50b35e535ea90772155ac23e9d0c26b2c1aa6d1b0 84828 wpa_2.5-2+v2.4-1.debian.tar.xz
Files:
 54d63746be61931f46899382f90ea5ef 2185 net optional wpa_2.5-2+v2.4-1.dsc
 6a77b9fe6838b4fca9b92cb22e14de1d 1834600 net optional wpa_2.5-2+v2.4.orig.tar.xz
 42a9406423204b32b431da8f8c6d122c 84828 net optional wpa_2.5-2+v2.4-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJXqGijAAoJEJ1bI/kYT6UUCVMH/3HtJTeB9X1ISg/12y4BP9dB
U5eSvh81gpZHtZ8njw6byvST/EpGFEfg0nWODgk0hGRF83QHUvKlkR5hBngSIGxP
EUpHXzIrmdWtKCHidxXcu3Qh6JeXdllreyocnUkt3S/Keiw6EUz7vp0edZ9cq32e
1Aq11qB+Bk7ZEV3wjuzjKISOYPm26KjCHJNNyEMJKHMvndATXMJR6EoFjDXjQyiP
G6oJ0sWc0UFfN9HmKXyDLbLoVhBIQxOzjbqvq5cZNSe2AKBEec/Rl3x60AtUDSG9
J4LBucUZUMTp9qobqClIMMfs9I4id3p3UyCUe8FVyW/UQ+EzOKdpALaYBCgvhgE=
=37do
-----END PGP SIGNATURE-----