New changelog entries:
* SECURITY UPDATE: Incorrect indication of disconnection in certain
situations
- debian/patches/CVE-2019-16275.patch: silently ignore management
frame from unexpected source address in src/ap/drv_callbacks.c, src/ap/ieee882_11.c.
- CVE-2019-16275
New changelog entries:
* Merge from Debian unstable. Remaining changes:
- debian/patches/wpa_service_ignore-on-isolate.patch: add
IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
will not kill off wpa and cause wireless to be unavailable on first
boot.
- debian/patches/session-ticket.patch: disable the TLS Session Ticket
extension to fix auth with 802.1x PEAP on some hardware.
* Dropped CVE-2019-13377 patches, part of 2.9 release
New changelog entries:
* New upstream release (Closes: #934180):
- SECURITY UPDATE (CVE-2019-13377):
Timing-based side-channel attack against WPA3's Dragonfly handshake
when using Brainpool curves.
More details:
+ https://w1.fi/security/2019-6/
+ https://wpa3.mathyvanhoef.com/
* Drop a patch applied upstream.
* Update debian/watch.
New changelog entries:
* Upload to unstable.
* Apply upstream patch:
- Use a separate flag for 4-way handshake offload.
* Spelling: meny -> menu.
* Add lintian overrides for known issues.
New changelog entries:
* Delete patches applied upstream.
* Apply upstream patch:
- Fix a regression in storing of external_auth SSID/BSSID
* Synchronise wpasupplicant configuration with the upstream.
New changelog entries:
* Upload to experimental.
* New upstream release.
* Update the watch file.
* Drop debian/README-DPP, install shipped READMEs.
* Refresh patches.