-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 31 Jul 2016 18:05:59 +0300 Source: wpa Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb Architecture: source Version: 2.5-1 Distribution: unstable Urgency: medium Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel@lists.alioth.debian.org> Changed-By: Andrew Shadura <andrewsh@debian.org> Description: hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator wpagui - graphical user interface for wpa_supplicant wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i) wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb) Closes: 545766 729934 766746 785579 806889 823171 823411 827253 Launchpad-Bugs-Fixed: 1422143 1545363 Changes: wpa (2.5-1) unstable; urgency=medium . [ Stefan Lippers-Hollmann ] * wpasupplicant: install systemd unit (Closes: #766746). * wpasupplicant: configure driver fallback for networkd. * import changelogs from the security queues. * move previous patch for CVE-2015-1863 into a new subdirectory, debian/patches/2015-1/. * fix dependency ordering when invoked with DBus, by making sure that DBus isn't shut down before wpa_supplicant, as that would also bring down wireless links which are still holding open NFS shares. Thanks to Facundo Gaich <facugaich@gmail.com> and Michael Biebl <biebl@debian.org> (Closes: #785579). * import NMU changelogs and integrate NMU changes. * Add patches to address CVE-2016-4476 and CVE-2016-4477, thanks to Salvatore Bonaccorso <carnil@debian.org> (Closes: #823411): - WPS: Reject a Credential with invalid passphrase - Reject psk parameter set with invalid passphrase character - Remove newlines from wpa_supplicant config network output - Reject SET_CRED commands with newline characters in the string values - Reject SET commands with newline characters in the string values * use --buildsystem=qmake_qt4 (available since dh 8.9.1) for debhelper (Closes: #823171). * fix clean target, by splitting the find call into individual searches. * building wpa in a current unstable chroot using debhelper >= 9.20151219 will introduce automatic dbgsym packages, thereby indirectly providing the requested debug packages for stretch and upwards (Closes: #729934). Don't add a versioned build-dependency in order to avoid unnecessary complications with backports. * change Vcs-Browser location to prefer https * debian/*: fix spelling errors noticed by lintian. * drop the obsolete Debian menu entry for wpa_gui, according to the tech-ctte decision on #741573. * fix debian/get-orig-source for wpa 2.6~. * add debian/watch file for the custom tarball generation. . [ Paul Donohue ] * debian/ifupdown/functions.sh: Fix handling for "wpa-roam". Call ifquery instead of directly parsing /run/*/ifstate files to work with current ifupdown. (Closes: #545766, LP: #1545363) . [ Martin Pitt ] * Add debian/system-sleep/wpasupplicant: Call wpa_cli suspend/resume before/after suspend, like the pm-utils hook. In some cases this brings back missing Wifi connection after resuming. (LP: #1422143) . [ Andrew Shadura ] * New upstream release (Closes: #806889). * Refresh patches, drop patches applied upstream. * Fix pkcs11 OpenSSL engine initialisation (Closes: #827253). * Update Vcs-* to point to Git. Checksums-Sha1: ce358b60cf6dbbf9200419d5a2e77a1d912b66fc 2136 wpa_2.5-1.dsc b994c7d0901d859caf2569c5326dd994b28ef8a2 1902700 wpa_2.5.orig.tar.xz 4f80cdd5d40d05f0ebd6700e5fb16a147b33f12d 78752 wpa_2.5-1.debian.tar.xz Checksums-Sha256: dbc54a35ae11ce67aba99d1a7ab9771bb399fef0e52c8fbe56ff86df27506f29 2136 wpa_2.5-1.dsc f3fde9c30e26721d1be918c11596288c88d450c731f6adf7eeb0c3f6813cec1b 1902700 wpa_2.5.orig.tar.xz c6bb60940d424b2b21b106c5e4913f3d2f73996d42704d2348fc3ed0702ec0e2 78752 wpa_2.5-1.debian.tar.xz Files: 7d28fa74c0c3c81967e6ce3daae75427 2136 net optional wpa_2.5-1.dsc 467fd350db7eba6649049b9053cb12db 1902700 net optional wpa_2.5.orig.tar.xz 322fbbb0936f5a93785fdc5cde72f8ce 78752 net optional wpa_2.5-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEbBAEBAgAGBQJXnhQ8AAoJEJ1bI/kYT6UU23EH9jDrofui5ljhqYwS3PpbEYay GW3FubJdk/LGMEodBsSUM3o2q9uSHcbbm5ELZPpnkjNpPEHMW6AgCG8MGmmHD3P6 VN2Jq7WSoS1ez1w1DHxVcn3uM5nJ1r6kO3qtI4sgSJ0GwCcOPbr6+4QqO0t1zAP9 kAVJK0My/JxZ+rlvE8WYO3nNcXgpyG361jdGK7ZpIIFzIqJeg14XIhPMbfRL8te2 QGR7vUndmGFO/mEizMQXxnNz900xs3ERJuNd2iR2qWffl7vo0tAE+ufjJ5R3FImE DRobqJ5WTkx0IhrOj9dZQmYmNlBvkh7LB0HCY38ZptDxoFdoqR10aGpWxRC5tg== =W/zp -----END PGP SIGNATURE-----