Back to wpa PTS page

Accepted wpa 2:2.4-1+deb9u6 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 07 Jul 2020 11:52:38 +0200
Source: wpa
Architecture: source
Version: 2:2.4-1+deb9u6
Distribution: stretch
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org>
Changed-By: Andrej Shadura <andrewsh@debian.org>
Closes: 940080 954457
Launchpad-Bugs-Fixed: 1867908
Changes:
 wpa (2:2.4-1+deb9u6) stretch; urgency=medium
 .
   * Refresh the patch for CVE-2019-16275 to include the missing inline
     function.
   * Add an upstream patch to fix the MAC randomisation issue with some
     cards (LP: #1867908, Closes: #954457)
 .
 wpa (2:2.4-1+deb9u5) stretch; urgency=medium
 .
   * SECURITY UPDATE:
     - AP mode PMF disconnection protection bypass.
       More details:
        + https://w1.fi/security/2019-7/
       Closes: #940080 (CVE-2019-16275)
Checksums-Sha1:
 48adc33bc40830b3ba553b187a0694c2de11bfa5 2304 wpa_2.4-1+deb9u6.dsc
 cac84655167b7262a408c35447a0a5b220f38c81 101412 wpa_2.4-1+deb9u6.debian.tar.xz
Checksums-Sha256:
 372b3ca96776be9224c88a0a03e42969470a0f0652d8753b592a431c3dc168b1 2304 wpa_2.4-1+deb9u6.dsc
 d0125627c8b22c29d3e5318e885d7dce0e2fba4a140821ae1002f62984473002 101412 wpa_2.4-1+deb9u6.debian.tar.xz
Files:
 0203579cb117255e9333d430aaf2596c 2304 net optional wpa_2.4-1+deb9u6.dsc
 1dabc64d9bb0cb6f6d8aa4b0a7bcd8c3 101412 net optional wpa_2.4-1+deb9u6.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEeuS9ZL8A0js0NGiOXkCM2RzYOdIFAl8ERs8ACgkQXkCM2RzY
OdIgMQf/QXS7j3eu2/bvhyGBRYh9YshKAbj8lJFDVcWs8m04MrW23npiPOXPAaWF
jjZHkQXBeCObKcSmjE+v2L+Sf2grHqYh0mk10BA0iobAPj21iqezmeu99aO/J827
44qWGKZSjjWls2gteVh/12Aty4aKSfZTGFSU1eaBO5L4/TM9+sl4hemXg4gIJEU6
8GKNeGRqCg32jeWSDaWDWPr74lhr2yf689PaX0nIIfbu2cr0w2nqDGpbiQBlOgps
6DqHglr1SNAjylQZmY1oBviOg3mD3WaXuX0tFhShNPrAEWbbCQIPbGpFGlDhPzbx
k4zqAuDnMbDEjydqj0dTlvnve3FRQw==
=ENkz
-----END PGP SIGNATURE-----