Branches for Trusty

Name Status Last Modified Last Commit
lp:ubuntu/trusty-proposed/wpa bug 2 Mature 2014-03-05 18:17:50 UTC
12. * New upstream release (LP: #1099755)...

Author: Mathieu Trudel-Lapierre
Revision Date: 2014-03-04 16:13:24 UTC

* New upstream release (LP: #1099755)
* debian/get-orig-source: update for new git repository for the current
  hostap/wpasupplicant versions.
* Dropped patches due to being applied upstream and included in the current
  source tarball:
  - debian/patches/11_wpa_gui_ftbfs_gcc_4_7.patch
  - debian/patches/13_human_readable_signal.patch
  - debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch
  - debian/patches/libnl3-includes.patch
* debian/patches/git_accept_client_cert_from_server.patch: revert the commit:
  "OpenSSL: Do not accept SSL Client certificate for server", which breaks
  many AAA servers that include both client and server EKUs. Cherry-picked
  from hostap git commit b62d5b5.

lp:ubuntu/trusty-security/wpa 2 Mature 2015-06-15 10:34:37 UTC
15. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2015-06-15 10:34:37 UTC

* SECURITY UPDATE: denial of service via WPS UPnP
  - debian/patches/CVE-2015-4141.patch: check chunk size in
    src/wps/httpread.c.
  - CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
  - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
  - CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
  - debian/patches/CVE-2015-4143-4146.patch: check lengths in
    src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
  - CVE-2015-4143
  - CVE-2015-4144
  - CVE-2015-4145
  - CVE-2015-4146

lp:ubuntu/trusty-updates/wpa 2 Mature 2015-06-15 10:34:37 UTC
15. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2015-06-15 10:34:37 UTC

* SECURITY UPDATE: denial of service via WPS UPnP
  - debian/patches/CVE-2015-4141.patch: check chunk size in
    src/wps/httpread.c.
  - CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
  - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
  - CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
  - debian/patches/CVE-2015-4143-4146.patch: check lengths in
    src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
  - CVE-2015-4143
  - CVE-2015-4144
  - CVE-2015-4145
  - CVE-2015-4146

lp:~sforshee/ubuntu/trusty/wpa/backports 1 Development 2014-07-29 19:21:46 UTC
13. * debian/patches/nl80211-Do-not-indic...

Author: Seth Forshee
Revision Date: 2014-07-29 19:20:01 UTC

* debian/patches/nl80211-Do-not-indicate-scan-started-event-on-scan_f.patch:
  Fix for condition which can cause radio work items to get stuck.
  Cherry-picked from hostap git commit 1b5df9e.
* debian/patches/wpa_supplicant-Complete-radio-works-on-disable-event.patch:
  Fix problems when an interface is rfkill blocked during ongoing radio
  work. Cherry-picked from hostap git commit a6cff8b.
* debian/patches/wpa_supplicant-Fix-radio_remove_interface.patch: Ensure
  pending radio work is removed when an interface is removed from a radio.
  Cherry-picked from hostap git commit c46235a.

lp:ubuntu/trusty/wpa 1 Development 2014-03-04 16:13:24 UTC
12. * New upstream release (LP: #1099755)...

Author: Mathieu Trudel-Lapierre
Revision Date: 2014-03-04 16:13:24 UTC

* New upstream release (LP: #1099755)
* debian/get-orig-source: update for new git repository for the current
  hostap/wpasupplicant versions.
* Dropped patches due to being applied upstream and included in the current
  source tarball:
  - debian/patches/11_wpa_gui_ftbfs_gcc_4_7.patch
  - debian/patches/13_human_readable_signal.patch
  - debian/patches/git_deinit_p2p_context_on_mgmt_remove_ff1f9c8.patch
  - debian/patches/libnl3-includes.patch
* debian/patches/git_accept_client_cert_from_server.patch: revert the commit:
  "OpenSSL: Do not accept SSL Client certificate for server", which breaks
  many AAA servers that include both client and server EKUs. Cherry-picked
  from hostap git commit b62d5b5.

15 of 5 results