View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/wpa
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-05-08 10:26:10 UTC 2019-05-08
DSC file for 2:2.8-2ubuntu1

Author: Ubuntu Git Importer
Author Date: 2019-05-08 10:26:10 UTC

DSC file for 2:2.8-2ubuntu1

applied/ubuntu/eoan-devel 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: df9edb7c83935e3cc1673caf4fa7a415ca199de8
Unapplied parent: b27b878aca80d72526b1fcc34b3f9443e8780eeb

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

ubuntu/devel 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 17696d2eecdb3c216ed7af32562216bf1400dcdf

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

applied/ubuntu/eoan 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: df9edb7c83935e3cc1673caf4fa7a415ca199de8
Unapplied parent: b27b878aca80d72526b1fcc34b3f9443e8780eeb

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

ubuntu/eoan 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 17696d2eecdb3c216ed7af32562216bf1400dcdf

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

applied/ubuntu/devel 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: df9edb7c83935e3cc1673caf4fa7a415ca199de8
Unapplied parent: b27b878aca80d72526b1fcc34b3f9443e8780eeb

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

ubuntu/eoan-proposed 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 17696d2eecdb3c216ed7af32562216bf1400dcdf

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

ubuntu/eoan-devel 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-unapplied version 2:2.8-2ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 17696d2eecdb3c216ed7af32562216bf1400dcdf

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

applied/ubuntu/eoan-proposed 2019-05-08 10:08:13 UTC 2019-05-08
Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Author: Julian Andres Klode
Author Date: 2019-05-08 09:57:47 UTC

Import patches-applied version 2:2.8-2ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: df9edb7c83935e3cc1673caf4fa7a415ca199de8
Unapplied parent: b27b878aca80d72526b1fcc34b3f9443e8780eeb

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
  * Dropped changes, upstream:
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - debian/patches/VU-871675/*.patch: backported upstream patches.
  * Remove android-headers build-depends

applied/ubuntu/cosmic-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-18ubuntu1.2 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:24 UTC

Import patches-applied version 2:2.6-18ubuntu1.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 99583d9777ddeac696dd950e377fa50c323cce04
Unapplied parent: d7f395c6caa6459a8e0053009410314814a5bae0

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/bionic-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-15ubuntu2.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:51 UTC

Import patches-unapplied version 2:2.6-15ubuntu2.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 2c653a05edc73069b05344dc631aaaa2859a42e0

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/xenial-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2.4-0ubuntu6.5 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:59:21 UTC

Import patches-unapplied version 2.4-0ubuntu6.5 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: da5465306e7ca5df002e25288d3d6a4625f429d2

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/xenial-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2.4-0ubuntu6.5 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:59:21 UTC

Import patches-unapplied version 2.4-0ubuntu6.5 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: da5465306e7ca5df002e25288d3d6a4625f429d2

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/xenial-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2.4-0ubuntu6.5 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:59:21 UTC

Import patches-unapplied version 2.4-0ubuntu6.5 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: da5465306e7ca5df002e25288d3d6a4625f429d2

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/bionic-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-15ubuntu2.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:51 UTC

Import patches-applied version 2:2.6-15ubuntu2.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 492d8680fab7f8411bd19242b986a33bb66235dc
Unapplied parent: b456f7e4dbe0bf1c89877f6e5597874d60b1dea4

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/bionic-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-15ubuntu2.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:51 UTC

Import patches-applied version 2:2.6-15ubuntu2.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 492d8680fab7f8411bd19242b986a33bb66235dc
Unapplied parent: b456f7e4dbe0bf1c89877f6e5597874d60b1dea4

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/bionic-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-15ubuntu2.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:51 UTC

Import patches-applied version 2:2.6-15ubuntu2.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 492d8680fab7f8411bd19242b986a33bb66235dc
Unapplied parent: b456f7e4dbe0bf1c89877f6e5597874d60b1dea4

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/cosmic-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-18ubuntu1.2 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:24 UTC

Import patches-applied version 2:2.6-18ubuntu1.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 99583d9777ddeac696dd950e377fa50c323cce04
Unapplied parent: d7f395c6caa6459a8e0053009410314814a5bae0

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/cosmic-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-18ubuntu1.2 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:24 UTC

Import patches-applied version 2:2.6-18ubuntu1.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 99583d9777ddeac696dd950e377fa50c323cce04
Unapplied parent: d7f395c6caa6459a8e0053009410314814a5bae0

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/disco-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-21ubuntu3.1 to applied/ubuntu/disco-secu...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:57:53 UTC

Import patches-applied version 2:2.6-21ubuntu3.1 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: f5709a4baaafbc1897844e7d3c3fffa7ceac0123
Unapplied parent: 51117c574dd4845b009b5fcac5691f1c3e5e0440

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/disco-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-21ubuntu3.1 to applied/ubuntu/disco-secu...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:57:53 UTC

Import patches-applied version 2:2.6-21ubuntu3.1 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: f5709a4baaafbc1897844e7d3c3fffa7ceac0123
Unapplied parent: 51117c574dd4845b009b5fcac5691f1c3e5e0440

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/disco-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2:2.6-21ubuntu3.1 to applied/ubuntu/disco-secu...

Author: Marc Deslauriers
Author Date: 2019-05-01 13:57:53 UTC

Import patches-applied version 2:2.6-21ubuntu3.1 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: f5709a4baaafbc1897844e7d3c3fffa7ceac0123
Unapplied parent: 51117c574dd4845b009b5fcac5691f1c3e5e0440

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/disco-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-21ubuntu3.1 to ubuntu/disco-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:57:53 UTC

Import patches-unapplied version 2:2.6-21ubuntu3.1 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: a13b570cba949f3f57bae252b6a52cbfbcd9f3d8

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/disco-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-21ubuntu3.1 to ubuntu/disco-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:57:53 UTC

Import patches-unapplied version 2:2.6-21ubuntu3.1 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: a13b570cba949f3f57bae252b6a52cbfbcd9f3d8

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/disco-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-21ubuntu3.1 to ubuntu/disco-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:57:53 UTC

Import patches-unapplied version 2:2.6-21ubuntu3.1 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: a13b570cba949f3f57bae252b6a52cbfbcd9f3d8

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/cosmic-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-18ubuntu1.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:24 UTC

Import patches-unapplied version 2:2.6-18ubuntu1.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 2449d82b64f048e0adfa3d097c6e99d32cddf7bd

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/cosmic-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-18ubuntu1.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:24 UTC

Import patches-unapplied version 2:2.6-18ubuntu1.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 2449d82b64f048e0adfa3d097c6e99d32cddf7bd

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/cosmic-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-18ubuntu1.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:24 UTC

Import patches-unapplied version 2:2.6-18ubuntu1.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 2449d82b64f048e0adfa3d097c6e99d32cddf7bd

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/bionic-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-15ubuntu2.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:51 UTC

Import patches-unapplied version 2:2.6-15ubuntu2.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 2c653a05edc73069b05344dc631aaaa2859a42e0

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

ubuntu/bionic-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-unapplied version 2:2.6-15ubuntu2.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:58:51 UTC

Import patches-unapplied version 2:2.6-15ubuntu2.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 2c653a05edc73069b05344dc631aaaa2859a42e0

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/xenial-devel 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2.4-0ubuntu6.5 to applied/ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:59:21 UTC

Import patches-applied version 2.4-0ubuntu6.5 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 978628911d1da109562813ee0094c6cde8dd93b5
Unapplied parent: 18b0e478a22ec128ab62bf5d738f073360bb53c5

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/xenial-security 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2.4-0ubuntu6.5 to applied/ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:59:21 UTC

Import patches-applied version 2.4-0ubuntu6.5 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 978628911d1da109562813ee0094c6cde8dd93b5
Unapplied parent: 18b0e478a22ec128ab62bf5d738f073360bb53c5

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

applied/ubuntu/xenial-updates 2019-05-07 14:13:17 UTC 2019-05-07
Import patches-applied version 2.4-0ubuntu6.5 to applied/ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-05-01 13:59:21 UTC

Import patches-applied version 2.4-0ubuntu6.5 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 978628911d1da109562813ee0094c6cde8dd93b5
Unapplied parent: 18b0e478a22ec128ab62bf5d738f073360bb53c5

New changelog entries:
  * SECURITY UPDATE: EAP-pwd DoS via unexpected fragment
    - debian/patches/CVE-2019-11555-1.patch: fix reassembly buffer handling
      in src/eap_server/eap_server_pwd.c.
    - debian/patches/CVE-2019-11555-2.patch: fix reassembly buffer handling
      in src/eap_peer/eap_pwd.c.
    - CVE-2019-11555

importer/debian/dsc 2019-04-28 22:43:30 UTC 2019-04-28
DSC file for 2:2.8-2

Author: Ubuntu Git Importer
Author Date: 2019-04-28 22:43:30 UTC

DSC file for 2:2.8-2

applied/debian/experimental 2019-04-28 22:28:01 UTC 2019-04-28
Import patches-applied version 2:2.8-2 to applied/debian/experimental

Author: Andrej Shadura
Author Date: 2019-04-28 19:20:19 UTC

Import patches-applied version 2:2.8-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 370b412859bccd7f12ab12777fdc61548f04eb62
Unapplied parent: ce44434afccc373a872570fe4a394a030a255663

New changelog entries:
  * Delete patches applied upstream.
  * Apply upstream patch:
    - Fix a regression in storing of external_auth SSID/BSSID
  * Synchronise wpasupplicant configuration with the upstream.

debian/experimental 2019-04-28 22:28:01 UTC 2019-04-28
Import patches-unapplied version 2:2.8-2 to debian/experimental

Author: Andrej Shadura
Author Date: 2019-04-28 19:20:19 UTC

Import patches-unapplied version 2:2.8-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 4b642c1b4cec5cc00f790e768e9711745b7c7912

New changelog entries:
  * Delete patches applied upstream.
  * Apply upstream patch:
    - Fix a regression in storing of external_auth SSID/BSSID
  * Synchronise wpasupplicant configuration with the upstream.

applied/debian/stretch 2019-04-27 11:08:15 UTC 2019-04-27
Import patches-applied version 2:2.4-1+deb9u3 to applied/debian/stretch

Author: Andrej Shadura
Author Date: 2019-04-10 16:57:51 UTC

Import patches-applied version 2:2.4-1+deb9u3 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 76a91b74f2eb0702ead3b308464bc1c8735de1dd
Unapplied parent: b393ac2fe5279788e3d0850537adaaf287fd9de0

New changelog entries:
  * Apply a partial security fix for CVE-2019-9495:
    - OpenSSL: Use constant time operations for private bignums.
    - See https://w1.fi/security/2019-2/ for more details.
  * Apply security fixes:
    - EAP-pwd server: Detect reflection attacks (CVE-2019-9497)
    - EAP-pwd client: Verify received scalar and element
      (partial fix for CVE-2019-9498)
    - EAP-pwd server: Verify received scalar and element
      (partial fix for CVE-2019-9499)
    - See https://w1.fi/security/2019-4/ for more details.
  * Add an upstream patch to add crypto_ec_point_cmp() required
    by the fixes for CVE-2019-9497.
  * Forcefully enable compilation of the ECC code.

debian/stretch 2019-04-27 11:08:15 UTC 2019-04-27
Import patches-unapplied version 2:2.4-1+deb9u3 to debian/stretch

Author: Andrej Shadura
Author Date: 2019-04-10 16:57:51 UTC

Import patches-unapplied version 2:2.4-1+deb9u3 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 5c6d5870e005c6c15ed8afd736c786ae43ab94c7

New changelog entries:
  * Apply a partial security fix for CVE-2019-9495:
    - OpenSSL: Use constant time operations for private bignums.
    - See https://w1.fi/security/2019-2/ for more details.
  * Apply security fixes:
    - EAP-pwd server: Detect reflection attacks (CVE-2019-9497)
    - EAP-pwd client: Verify received scalar and element
      (partial fix for CVE-2019-9498)
    - EAP-pwd server: Verify received scalar and element
      (partial fix for CVE-2019-9499)
    - See https://w1.fi/security/2019-4/ for more details.
  * Add an upstream patch to add crypto_ec_point_cmp() required
    by the fixes for CVE-2019-9497.
  * Forcefully enable compilation of the ECC code.

applied/debian/sid 2019-04-26 16:42:23 UTC 2019-04-26
Import patches-applied version 2:2.7+git20190128+0c1e29f-5 to applied/debian/sid

Author: Andrej Shadura
Author Date: 2019-04-26 12:55:52 UTC

Import patches-applied version 2:2.7+git20190128+0c1e29f-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ddf8c9d2fe70557b5a322ad32ecf2d116cc7d769
Unapplied parent: 141efa1c32cbde3421f888c7955fd29774f3f081

New changelog entries:
  * Fix security issue 2019-5:
    - EAP-pwd message reassembly issue with unexpected fragment
      (Closes: #927463, no CVE assigned).

debian/buster 2019-04-26 16:42:23 UTC 2019-04-26
Import patches-unapplied version 2:2.7+git20190128+0c1e29f-5 to debian/sid

Author: Andrej Shadura
Author Date: 2019-04-26 12:55:52 UTC

Import patches-unapplied version 2:2.7+git20190128+0c1e29f-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 44454bd7f66197fecf97c4ab7ca720c0d001a722

New changelog entries:
  * Fix security issue 2019-5:
    - EAP-pwd message reassembly issue with unexpected fragment
      (Closes: #927463, no CVE assigned).

debian/sid 2019-04-26 16:42:23 UTC 2019-04-26
Import patches-unapplied version 2:2.7+git20190128+0c1e29f-5 to debian/sid

Author: Andrej Shadura
Author Date: 2019-04-26 12:55:52 UTC

Import patches-unapplied version 2:2.7+git20190128+0c1e29f-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 44454bd7f66197fecf97c4ab7ca720c0d001a722

New changelog entries:
  * Fix security issue 2019-5:
    - EAP-pwd message reassembly issue with unexpected fragment
      (Closes: #927463, no CVE assigned).

applied/debian/buster 2019-04-26 16:42:23 UTC 2019-04-26
Import patches-applied version 2:2.7+git20190128+0c1e29f-5 to applied/debian/sid

Author: Andrej Shadura
Author Date: 2019-04-26 12:55:52 UTC

Import patches-applied version 2:2.7+git20190128+0c1e29f-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ddf8c9d2fe70557b5a322ad32ecf2d116cc7d769
Unapplied parent: 141efa1c32cbde3421f888c7955fd29774f3f081

New changelog entries:
  * Fix security issue 2019-5:
    - EAP-pwd message reassembly issue with unexpected fragment
      (Closes: #927463, no CVE assigned).

applied/ubuntu/disco 2019-04-10 22:23:14 UTC 2019-04-10
Import patches-applied version 2:2.6-21ubuntu3 to applied/ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-04-10 16:54:21 UTC

Import patches-applied version 2:2.6-21ubuntu3 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 7cd8f40334cae44164c627137cd0f09ff30184e0
Unapplied parent: 745936666ebf0ee208f9dbdab892bb3ef176f692

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499

ubuntu/disco-proposed 2019-04-10 22:23:14 UTC 2019-04-10
Import patches-unapplied version 2:2.6-21ubuntu3 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-04-10 16:54:21 UTC

Import patches-unapplied version 2:2.6-21ubuntu3 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a78433cefc10b5c63ca070ed11343d7ada2d6a63

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499

applied/ubuntu/disco-proposed 2019-04-10 22:23:14 UTC 2019-04-10
Import patches-applied version 2:2.6-21ubuntu3 to applied/ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-04-10 16:54:21 UTC

Import patches-applied version 2:2.6-21ubuntu3 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 7cd8f40334cae44164c627137cd0f09ff30184e0
Unapplied parent: 745936666ebf0ee208f9dbdab892bb3ef176f692

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499

ubuntu/disco 2019-04-10 22:23:14 UTC 2019-04-10
Import patches-unapplied version 2:2.6-21ubuntu3 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-04-10 16:54:21 UTC

Import patches-unapplied version 2:2.6-21ubuntu3 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a78433cefc10b5c63ca070ed11343d7ada2d6a63

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499

ubuntu/trusty-devel 2019-04-10 16:48:20 UTC 2019-04-10
Import patches-unapplied version 2.1-0ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-04-09 12:28:53 UTC

Import patches-unapplied version 2.1-0ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 43cc42ab053e8dc9ced2bc672ca6f6e3410396da

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
      generation.
    - CVE-2016-10743

applied/ubuntu/trusty-devel 2019-04-10 16:48:20 UTC 2019-04-10
Import patches-applied version 2.1-0ubuntu1.7 to applied/ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-04-09 12:28:53 UTC

Import patches-applied version 2.1-0ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: dea2894b9dbaa65c751be1da6323af6278ce7e27
Unapplied parent: 86de0dc413e6f766fcae904c3960c6d976872802

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
      generation.
    - CVE-2016-10743

applied/ubuntu/trusty-updates 2019-04-10 16:48:20 UTC 2019-04-10
Import patches-applied version 2.1-0ubuntu1.7 to applied/ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-04-09 12:28:53 UTC

Import patches-applied version 2.1-0ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: dea2894b9dbaa65c751be1da6323af6278ce7e27
Unapplied parent: 86de0dc413e6f766fcae904c3960c6d976872802

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
      generation.
    - CVE-2016-10743

applied/ubuntu/trusty-security 2019-04-10 16:48:20 UTC 2019-04-10
Import patches-applied version 2.1-0ubuntu1.7 to applied/ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-04-09 12:28:53 UTC

Import patches-applied version 2.1-0ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: dea2894b9dbaa65c751be1da6323af6278ce7e27
Unapplied parent: 86de0dc413e6f766fcae904c3960c6d976872802

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
      generation.
    - CVE-2016-10743

ubuntu/trusty-updates 2019-04-10 16:48:20 UTC 2019-04-10
Import patches-unapplied version 2.1-0ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-04-09 12:28:53 UTC

Import patches-unapplied version 2.1-0ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 43cc42ab053e8dc9ced2bc672ca6f6e3410396da

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
      generation.
    - CVE-2016-10743

ubuntu/trusty-security 2019-04-10 16:48:20 UTC 2019-04-10
Import patches-unapplied version 2.1-0ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-04-09 12:28:53 UTC

Import patches-unapplied version 2.1-0ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 43cc42ab053e8dc9ced2bc672ca6f6e3410396da

New changelog entries:
  * SECURITY UPDATE: Multiple security issues
    - debian/patches/VU-871675/*.patch: backported upstream patches.
    - CVE-2019-9495
    - CVE-2019-9497
    - CVE-2019-9498
    - CVE-2019-9499
  * SECURITY UPDATE: insecure os_random() fallback
    - debian/patches/CVE-2016-10743.patch: Use only os_get_random() for PIN
      generation.
    - CVE-2016-10743

applied/ubuntu/cosmic 2018-08-16 09:53:24 UTC 2018-08-16
Import patches-applied version 2:2.6-18ubuntu1 to applied/ubuntu/cosmic-proposed

Author: Julian Andres Klode
Author Date: 2018-08-16 09:22:10 UTC

Import patches-applied version 2:2.6-18ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 2bb2227694b052b33659f52903a0d37bba901626
Unapplied parent: 0d8fac90e5a653d3866851036dc07db714ec13af

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method
      for requesting a firmware change when working with the Android HAL;
      this is used to set a device in P2P or AP mode; conditional to
      CONFIG_ANDROID_HAL being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required
      wifi headers for the HAL support.

applied/ubuntu/cosmic-proposed 2018-08-16 09:53:24 UTC 2018-08-16
Import patches-applied version 2:2.6-18ubuntu1 to applied/ubuntu/cosmic-proposed

Author: Julian Andres Klode
Author Date: 2018-08-16 09:22:10 UTC

Import patches-applied version 2:2.6-18ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 2bb2227694b052b33659f52903a0d37bba901626
Unapplied parent: 0d8fac90e5a653d3866851036dc07db714ec13af

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method
      for requesting a firmware change when working with the Android HAL;
      this is used to set a device in P2P or AP mode; conditional to
      CONFIG_ANDROID_HAL being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required
      wifi headers for the HAL support.

ubuntu/cosmic 2018-08-16 09:53:24 UTC 2018-08-16
Import patches-unapplied version 2:2.6-18ubuntu1 to ubuntu/cosmic-proposed

Author: Julian Andres Klode
Author Date: 2018-08-16 09:22:10 UTC

Import patches-unapplied version 2:2.6-18ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: df8680125c4baf36fde24dee6bc47108bd74dfa1

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method
      for requesting a firmware change when working with the Android HAL;
      this is used to set a device in P2P or AP mode; conditional to
      CONFIG_ANDROID_HAL being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required
      wifi headers for the HAL support.

ubuntu/cosmic-proposed 2018-08-16 09:53:24 UTC 2018-08-16
Import patches-unapplied version 2:2.6-18ubuntu1 to ubuntu/cosmic-proposed

Author: Julian Andres Klode
Author Date: 2018-08-16 09:22:10 UTC

Import patches-unapplied version 2:2.6-18ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: df8680125c4baf36fde24dee6bc47108bd74dfa1

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method
      for requesting a firmware change when working with the Android HAL;
      this is used to set a device in P2P or AP mode; conditional to
      CONFIG_ANDROID_HAL being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required
      wifi headers for the HAL support.

importer/ubuntu/pristine-tar 2018-03-09 21:14:01 UTC 2018-03-09
pristine-tar data for wpa_2.6.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-09 21:14:01 UTC

pristine-tar data for wpa_2.6.orig.tar.xz

importer/debian/pristine-tar 2018-03-09 20:57:24 UTC 2018-03-09
pristine-tar data for wpa_2.4.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-09 20:57:24 UTC

pristine-tar data for wpa_2.4.orig.tar.xz

applied/ubuntu/bionic 2018-02-05 18:04:13 UTC 2018-02-05
Import patches-applied version 2:2.6-15ubuntu2 to applied/ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-05 16:55:53 UTC

Import patches-applied version 2:2.6-15ubuntu2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 83c0758f8ae6b03c99e07c6a3c27417f4c39d639
Unapplied parent: aa22dc47480f3ed9380f2d8002d5a2e044def3fd

New changelog entries:
  * No change rebuild against openssl1.1.

applied/ubuntu/bionic-proposed 2018-02-05 18:04:13 UTC 2018-02-05
Import patches-applied version 2:2.6-15ubuntu2 to applied/ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-05 16:55:53 UTC

Import patches-applied version 2:2.6-15ubuntu2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 83c0758f8ae6b03c99e07c6a3c27417f4c39d639
Unapplied parent: aa22dc47480f3ed9380f2d8002d5a2e044def3fd

New changelog entries:
  * No change rebuild against openssl1.1.

ubuntu/bionic 2018-02-05 18:04:13 UTC 2018-02-05
Import patches-unapplied version 2:2.6-15ubuntu2 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-05 16:55:53 UTC

Import patches-unapplied version 2:2.6-15ubuntu2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: b90aad7785b0b9054310bd840cd03c81df0978d1

New changelog entries:
  * No change rebuild against openssl1.1.

ubuntu/bionic-proposed 2018-02-05 18:04:13 UTC 2018-02-05
Import patches-unapplied version 2:2.6-15ubuntu2 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-05 16:55:53 UTC

Import patches-unapplied version 2:2.6-15ubuntu2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: b90aad7785b0b9054310bd840cd03c81df0978d1

New changelog entries:
  * No change rebuild against openssl1.1.

debian/jessie 2017-12-09 17:59:07 UTC 2017-12-09
Import patches-unapplied version 2.3-1+deb8u5 to debian/jessie

Author: Yves-Alexis Perez
Author Date: 2017-10-14 12:11:26 UTC

Import patches-unapplied version 2.3-1+deb8u5 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 0957d6e53102cbf0bc8b8ddcf31bee4f1ab8c93c

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add patches to fix WPA protocol vulnerabilities (CVE-2017-13077,
    CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081,
    CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088):
    - hostapd: Avoid key reinstallation in FT handshake
    - Prevent reinstallation of an already in-use group key
    - Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases
    - Fix PTK rekeying to generate a new ANonce
    - TDLS: Reject TPK-TK reconfiguration
    - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used
    - WNM: Ignore WNM-Sleep Mode Response without pending request
    - FT: Do not allow multiple Reassociation Response frames
    - TDLS: Ignore incoming TDLS Setup Response retries

applied/debian/jessie 2017-12-09 17:59:07 UTC 2017-12-09
Import patches-applied version 2.3-1+deb8u5 to applied/debian/jessie

Author: Yves-Alexis Perez
Author Date: 2017-10-14 12:11:26 UTC

Import patches-applied version 2.3-1+deb8u5 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: aa23d67228d81c0beff4b25fc22d65a729ff9875
Unapplied parent: c79dcfc7a0db982b995e22701a4f5f8c81042868

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add patches to fix WPA protocol vulnerabilities (CVE-2017-13077,
    CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081,
    CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088):
    - hostapd: Avoid key reinstallation in FT handshake
    - Prevent reinstallation of an already in-use group key
    - Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases
    - Fix PTK rekeying to generate a new ANonce
    - TDLS: Reject TPK-TK reconfiguration
    - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used
    - WNM: Ignore WNM-Sleep Mode Response without pending request
    - FT: Do not allow multiple Reassociation Response frames
    - TDLS: Ignore incoming TDLS Setup Response retries

ubuntu/artful-proposed 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-unapplied version 2.4-0ubuntu10 to ubuntu/artful-proposed

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-unapplied version 2.4-0ubuntu10 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 473175f31d3ca4784b7edb6bc51c272f1563ccd6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

applied/ubuntu/artful-devel 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-applied version 2.4-0ubuntu10 to applied/ubuntu/artful-proposed

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-applied version 2.4-0ubuntu10 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 45ecb99de525c2b9bd5b2725e4b4f1ea4cdd35d6
Unapplied parent: 6843135d28e28612aadaead83ca05c73a491e7d9

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

applied/ubuntu/artful-proposed 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-applied version 2.4-0ubuntu10 to applied/ubuntu/artful-proposed

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-applied version 2.4-0ubuntu10 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 45ecb99de525c2b9bd5b2725e4b4f1ea4cdd35d6
Unapplied parent: 6843135d28e28612aadaead83ca05c73a491e7d9

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

applied/ubuntu/artful 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-applied version 2.4-0ubuntu10 to applied/ubuntu/artful-proposed

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-applied version 2.4-0ubuntu10 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 45ecb99de525c2b9bd5b2725e4b4f1ea4cdd35d6
Unapplied parent: 6843135d28e28612aadaead83ca05c73a491e7d9

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

ubuntu/artful 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-unapplied version 2.4-0ubuntu10 to ubuntu/artful-proposed

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-unapplied version 2.4-0ubuntu10 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 473175f31d3ca4784b7edb6bc51c272f1563ccd6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

ubuntu/artful-devel 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-unapplied version 2.4-0ubuntu10 to ubuntu/artful-proposed

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-unapplied version 2.4-0ubuntu10 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 473175f31d3ca4784b7edb6bc51c272f1563ccd6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

ubuntu/zesty-security 2017-10-16 16:19:11 UTC 2017-10-16
Import patches-unapplied version 2.4-0ubuntu9.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-unapplied version 2.4-0ubuntu9.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 473175f31d3ca4784b7edb6bc51c272f1563ccd6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

ubuntu/zesty-devel 2017-10-16 16:19:11 UTC 2017-10-16
Import patches-unapplied version 2.4-0ubuntu9.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-unapplied version 2.4-0ubuntu9.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 473175f31d3ca4784b7edb6bc51c272f1563ccd6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

applied/ubuntu/zesty-updates 2017-10-16 16:19:11 UTC 2017-10-16
Import patches-applied version 2.4-0ubuntu9.1 to applied/ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-applied version 2.4-0ubuntu9.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 45ecb99de525c2b9bd5b2725e4b4f1ea4cdd35d6
Unapplied parent: 9157f3bb1f6fc618e3e628b4f0cb34485d66bbe6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

applied/ubuntu/zesty-devel 2017-10-16 16:19:11 UTC 2017-10-16
Import patches-applied version 2.4-0ubuntu9.1 to applied/ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-applied version 2.4-0ubuntu9.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 45ecb99de525c2b9bd5b2725e4b4f1ea4cdd35d6
Unapplied parent: 9157f3bb1f6fc618e3e628b4f0cb34485d66bbe6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

applied/ubuntu/zesty-security 2017-10-16 16:19:11 UTC 2017-10-16
Import patches-applied version 2.4-0ubuntu9.1 to applied/ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-applied version 2.4-0ubuntu9.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 45ecb99de525c2b9bd5b2725e4b4f1ea4cdd35d6
Unapplied parent: 9157f3bb1f6fc618e3e628b4f0cb34485d66bbe6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

ubuntu/zesty-updates 2017-10-16 16:19:11 UTC 2017-10-16
Import patches-unapplied version 2.4-0ubuntu9.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-10-16 11:41:21 UTC

Import patches-unapplied version 2.4-0ubuntu9.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 473175f31d3ca4784b7edb6bc51c272f1563ccd6

New changelog entries:
  * SECURITY UPDATE: Multiple issues in WPA protocol
    - debian/patches/2017-1/*.patch: Add patches from Debian stretch
    - CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
      CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
      CVE-2017-13088
  * SECURITY UPDATE: Denial of service issues
    - debian/patches/2016-1/*.patch: Add patches from Debian stretch
    - CVE-2016-4476
    - CVE-2016-4477

ubuntu/xenial-proposed 2017-08-31 21:33:38 UTC 2017-08-31
Import patches-unapplied version 2.4-0ubuntu6.1 to ubuntu/xenial-proposed

Author: Mathieu Trudel-Lapierre
Author Date: 2017-08-31 18:31:25 UTC

Import patches-unapplied version 2.4-0ubuntu6.1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 0c87d5b1af7b9073340bce26255c697054908aec

New changelog entries:
  * debian/patches/wpa_service_ignore-on-isolate.patch: Add IgnoreOnIsolate=yes
    so when isolating to default.target as oem-config does, we don't stop
    wpasupplicant and cause wifi to be unavailable. (LP: #1576024)

applied/ubuntu/xenial-proposed 2017-08-31 21:33:38 UTC 2017-08-31
Import patches-applied version 2.4-0ubuntu6.1 to applied/ubuntu/xenial-proposed

Author: Mathieu Trudel-Lapierre
Author Date: 2017-08-31 18:31:25 UTC

Import patches-applied version 2.4-0ubuntu6.1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 6cff0e06a15a892b933ed7b4158c4b7a4d585fb5
Unapplied parent: 967e29ad34996a53ed46cc659a81b7cf62726bc7

New changelog entries:
  * debian/patches/wpa_service_ignore-on-isolate.patch: Add IgnoreOnIsolate=yes
    so when isolating to default.target as oem-config does, we don't stop
    wpasupplicant and cause wifi to be unavailable. (LP: #1576024)

ubuntu/zesty-proposed 2017-03-13 18:24:08 UTC 2017-03-13
Import patches-unapplied version 2.4-0ubuntu9 to ubuntu/zesty-proposed

Author: Mathieu Trudel-Lapierre
Author Date: 2017-03-13 17:46:12 UTC

Import patches-unapplied version 2.4-0ubuntu9 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 31b416b4f7055408d99280d60381d60d35a2806d

New changelog entries:
  * debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes
    so that when switching "runlevels" in oem-config will not kill off wpa
    and cause wireless to be unavailable on first boot. (LP: #1576024)

ubuntu/zesty 2017-03-13 18:24:08 UTC 2017-03-13
Import patches-unapplied version 2.4-0ubuntu9 to ubuntu/zesty-proposed

Author: Mathieu Trudel-Lapierre
Author Date: 2017-03-13 17:46:12 UTC

Import patches-unapplied version 2.4-0ubuntu9 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 31b416b4f7055408d99280d60381d60d35a2806d

New changelog entries:
  * debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes
    so that when switching "runlevels" in oem-config will not kill off wpa
    and cause wireless to be unavailable on first boot. (LP: #1576024)

applied/ubuntu/zesty 2017-03-13 18:24:08 UTC 2017-03-13
Import patches-applied version 2.4-0ubuntu9 to applied/ubuntu/zesty-proposed

Author: Mathieu Trudel-Lapierre
Author Date: 2017-03-13 17:46:12 UTC

Import patches-applied version 2.4-0ubuntu9 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: d5307aa756472fe5218658a7283ed793d7e9df4e
Unapplied parent: 4ea15f988a137fb794ade1563a54e1f4f7ddffe0

New changelog entries:
  * debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes
    so that when switching "runlevels" in oem-config will not kill off wpa
    and cause wireless to be unavailable on first boot. (LP: #1576024)

applied/ubuntu/zesty-proposed 2017-03-13 18:24:08 UTC 2017-03-13
Import patches-applied version 2.4-0ubuntu9 to applied/ubuntu/zesty-proposed

Author: Mathieu Trudel-Lapierre
Author Date: 2017-03-13 17:46:12 UTC

Import patches-applied version 2.4-0ubuntu9 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: d5307aa756472fe5218658a7283ed793d7e9df4e
Unapplied parent: 4ea15f988a137fb794ade1563a54e1f4f7ddffe0

New changelog entries:
  * debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes
    so that when switching "runlevels" in oem-config will not kill off wpa
    and cause wireless to be unavailable on first boot. (LP: #1576024)

ubuntu/yakkety 2016-09-17 13:20:01 UTC 2016-09-17
Import patches-unapplied version 2.4-0ubuntu8 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-09-17 12:12:22 UTC

Import patches-unapplied version 2.4-0ubuntu8 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e1a8b1f50e368595b0123873fd923bfcb73eefbb

New changelog entries:
  * No-change rebuild for readline soname change.

applied/ubuntu/yakkety-devel 2016-09-17 13:20:01 UTC 2016-09-17
Import patches-applied version 2.4-0ubuntu8 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-09-17 12:12:22 UTC

Import patches-applied version 2.4-0ubuntu8 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e400aff8dd8d002fcb20bf1d41d06ed7f87cbc30
Unapplied parent: 80f02ef1eb8d5614c430c760aab08dce5e7800d0

New changelog entries:
  * No-change rebuild for readline soname change.

applied/ubuntu/yakkety 2016-09-17 13:20:01 UTC 2016-09-17
Import patches-applied version 2.4-0ubuntu8 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-09-17 12:12:22 UTC

Import patches-applied version 2.4-0ubuntu8 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e400aff8dd8d002fcb20bf1d41d06ed7f87cbc30
Unapplied parent: 80f02ef1eb8d5614c430c760aab08dce5e7800d0

New changelog entries:
  * No-change rebuild for readline soname change.

applied/ubuntu/yakkety-proposed 2016-09-17 13:20:01 UTC 2016-09-17
Import patches-applied version 2.4-0ubuntu8 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-09-17 12:12:22 UTC

Import patches-applied version 2.4-0ubuntu8 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e400aff8dd8d002fcb20bf1d41d06ed7f87cbc30
Unapplied parent: 80f02ef1eb8d5614c430c760aab08dce5e7800d0

New changelog entries:
  * No-change rebuild for readline soname change.

ubuntu/yakkety-proposed 2016-09-17 13:20:01 UTC 2016-09-17
Import patches-unapplied version 2.4-0ubuntu8 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-09-17 12:12:22 UTC

Import patches-unapplied version 2.4-0ubuntu8 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e1a8b1f50e368595b0123873fd923bfcb73eefbb

New changelog entries:
  * No-change rebuild for readline soname change.

ubuntu/yakkety-devel 2016-09-17 13:20:01 UTC 2016-09-17
Import patches-unapplied version 2.4-0ubuntu8 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-09-17 12:12:22 UTC

Import patches-unapplied version 2.4-0ubuntu8 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e1a8b1f50e368595b0123873fd923bfcb73eefbb

New changelog entries:
  * No-change rebuild for readline soname change.

applied/debian/wheezy 2016-04-02 23:45:26 UTC 2016-04-02
Import patches-applied version 1.0-3+deb7u3 to applied/debian/wheezy

Author: Salvatore Bonaccorso
Author Date: 2015-10-31 11:08:04 UTC

Import patches-applied version 1.0-3+deb7u3 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 2bf9f65d91524ac309c8a670124fde4878c65c78
Unapplied parent: 7291c06d313e1ab691ed42379cf6bb961ac9c1b9

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add patch to address CVE-2015-4141.
    CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer
    encoding. (Closes: #787372)
  * Add patch to address CVE-2015-4142.
    CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing.
    (Closes: #787373)
  * Add patches to address CVE-2015-4143.
    CVE-2015-4143: EAP-pwd missing payload length validation. (Closes: #787371)
  * Add patch to address 2015-5 vulnerability.
    NFC: Fix payload length validation in NDEF record parser.
    Note that this issue does not affect the binary packages distributed in
    Debian in Wheezy as CONFIG_WPS_NFC=y is not set in the build
    configuration. (Closes: #795740)

debian/wheezy 2016-04-02 23:45:26 UTC 2016-04-02
Import patches-unapplied version 1.0-3+deb7u3 to debian/wheezy

Author: Salvatore Bonaccorso
Author Date: 2015-10-31 11:08:04 UTC

Import patches-unapplied version 1.0-3+deb7u3 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: a5da8c1598eabac5f6bc5033a4be685dca973a17

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add patch to address CVE-2015-4141.
    CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer
    encoding. (Closes: #787372)
  * Add patch to address CVE-2015-4142.
    CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing.
    (Closes: #787373)
  * Add patches to address CVE-2015-4143.
    CVE-2015-4143: EAP-pwd missing payload length validation. (Closes: #787371)
  * Add patch to address 2015-5 vulnerability.
    NFC: Fix payload length validation in NDEF record parser.
    Note that this issue does not affect the binary packages distributed in
    Debian in Wheezy as CONFIG_WPS_NFC=y is not set in the build
    configuration. (Closes: #795740)

ubuntu/xenial 2016-01-19 13:55:46 UTC 2016-01-19
Import patches-unapplied version 2.4-0ubuntu6 to ubuntu/xenial-proposed

Author: Timo Jyrinki
Author Date: 2016-01-19 10:36:00 UTC

Import patches-unapplied version 2.4-0ubuntu6 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2dc40f2ab1e8f50c1d28a1ea0f7194526e2c1c59

New changelog entries:
  * debian/patches/wpasupplicant_band_selection_aa517ae2.patch: add the last
    missing 5 GHz band selection related cherry-pick from Debian that was not
    included in wpa 2.4 (LP: #1517040)

applied/ubuntu/xenial 2016-01-19 13:55:46 UTC 2016-01-19
Import patches-applied version 2.4-0ubuntu6 to applied/ubuntu/xenial-proposed

Author: Timo Jyrinki
Author Date: 2016-01-19 10:36:00 UTC

Import patches-applied version 2.4-0ubuntu6 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 175fd44efd1f79b03138624b9e637d64ee938640
Unapplied parent: f60a0ae0c26d5a0742fb732a576fdf4e1beb0b15

New changelog entries:
  * debian/patches/wpasupplicant_band_selection_aa517ae2.patch: add the last
    missing 5 GHz band selection related cherry-pick from Debian that was not
    included in wpa 2.4 (LP: #1517040)

applied/ubuntu/vivid-security 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-applied version 2.1-0ubuntu7.3 to applied/ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-11-09 13:22:31 UTC

Import patches-applied version 2.1-0ubuntu7.3 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 1748b2bdef89d655e8abfcef60c105faaae39da6
Unapplied parent: 94f763983780e58cf16bae9673e92f933a5ba731

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

applied/ubuntu/wily-updates 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-applied version 2.4-0ubuntu3.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2015-11-09 12:52:23 UTC

Import patches-applied version 2.4-0ubuntu3.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 7448e2838e242785f3582b5efda6d3c8df23e7a6
Unapplied parent: 910b3c4ef2bc13f400929ecc0f55f407a664c689

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315
  * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
    message
    - debian/patches/CVE-2015-5316.patch: fix error path in
      src/eap_peer/eap_pwd.c.
    - CVE-2015-5316
  * This package does _not_ contain the changes from 2.4-0ubuntu3.1 in
    wily-proposed.

applied/ubuntu/wily-security 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-applied version 2.4-0ubuntu3.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2015-11-09 12:52:23 UTC

Import patches-applied version 2.4-0ubuntu3.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 7448e2838e242785f3582b5efda6d3c8df23e7a6
Unapplied parent: 910b3c4ef2bc13f400929ecc0f55f407a664c689

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315
  * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
    message
    - debian/patches/CVE-2015-5316.patch: fix error path in
      src/eap_peer/eap_pwd.c.
    - CVE-2015-5316
  * This package does _not_ contain the changes from 2.4-0ubuntu3.1 in
    wily-proposed.

applied/ubuntu/wily-devel 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-applied version 2.4-0ubuntu3.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2015-11-09 12:52:23 UTC

Import patches-applied version 2.4-0ubuntu3.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 7448e2838e242785f3582b5efda6d3c8df23e7a6
Unapplied parent: 910b3c4ef2bc13f400929ecc0f55f407a664c689

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315
  * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
    message
    - debian/patches/CVE-2015-5316.patch: fix error path in
      src/eap_peer/eap_pwd.c.
    - CVE-2015-5316
  * This package does _not_ contain the changes from 2.4-0ubuntu3.1 in
    wily-proposed.

applied/ubuntu/vivid-updates 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-applied version 2.1-0ubuntu7.3 to applied/ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-11-09 13:22:31 UTC

Import patches-applied version 2.1-0ubuntu7.3 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 1748b2bdef89d655e8abfcef60c105faaae39da6
Unapplied parent: 94f763983780e58cf16bae9673e92f933a5ba731

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

applied/ubuntu/vivid-devel 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-applied version 2.1-0ubuntu7.3 to applied/ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-11-09 13:22:31 UTC

Import patches-applied version 2.1-0ubuntu7.3 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 1748b2bdef89d655e8abfcef60c105faaae39da6
Unapplied parent: 94f763983780e58cf16bae9673e92f933a5ba731

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

ubuntu/vivid-devel 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-unapplied version 2.1-0ubuntu7.3 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-11-09 13:22:31 UTC

Import patches-unapplied version 2.1-0ubuntu7.3 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 50da878c023df692798b0038ecc2343bd34e6432

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

ubuntu/vivid-security 2015-11-10 18:19:44 UTC 2015-11-10
Import patches-unapplied version 2.1-0ubuntu7.3 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-11-09 13:22:31 UTC

Import patches-unapplied version 2.1-0ubuntu7.3 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 50da878c023df692798b0038ecc2343bd34e6432

New changelog entries:
  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315

1100 of 144 results

Other repositories

Name Last Modified
lp:ubuntu/+source/wpa 2019-05-08
11 of 1 result
You can't create new repositories for wpa in Ubuntu.