Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: update wpa to 2:2.10-22 (CVE-2024-5290) #1

Merged
merged 2 commits into from
Aug 19, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
9 changes: 8 additions & 1 deletion .gitignore
Original file line number Diff line number Diff line change
@@ -1 +1,8 @@
.pc/
*.pyc
*~
tests/hwsim/logs
tests/remote/logs
wpaspy/build
**/parallel-vm.log
tags
build/
1 change: 0 additions & 1 deletion .projectinfo

This file was deleted.

10 changes: 0 additions & 10 deletions Android.mk

This file was deleted.

47 changes: 0 additions & 47 deletions build_release

This file was deleted.

11 changes: 11 additions & 0 deletions debian/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
*.debhelper
*.substvars
.debhelper/
debhelper-build-stamp
eapoltest/
files
hostapd/
libwpa-client-dev/
wpagui/
wpasupplicant-udeb/
wpasupplicant/
40 changes: 37 additions & 3 deletions debian/NEWS
Original file line number Diff line number Diff line change
@@ -1,5 +1,39 @@
wpa (2:2.10-deepin) stable; urgency=medium
wpasupplicant (2:2.6-19) unstable; urgency=medium

* ['Rebuild against by current gcc 11.2']
With this release, wpasupplicant no longer respects the system
default minimum TLS version, defaulting to TLSv1.0, not TLSv1.2. If
you're sure you will never connect to EAP networks requiring anything less
than 1.2, add this to your wpasupplicant configuration:

-- Deepin Packages Builder <[email protected]> Wed, 10 Aug 2022 21:31:41 +0800
tls_disable_tlsv1_0=1
tls_disable_tlsv1_1=1

wpasupplicant also defaults to a security level 1, instead of the system
default 2. Should you need to change that, change this setting in your
wpasupplicant configuration:

openssl_ciphers=DEFAULT@SECLEVEL=2

Unlike wpasupplicant, hostapd still respects system defaults.

-- Andrej Shadura <[email protected]> Sat, 15 Dec 2018 14:22:18 +0100

wpasupplicant (0.6.2-1) unstable; urgency=low

The -w (wait for network interface to exist) command line option no longer
exists. If you have scripts that require this option, it is time to change
them, or use one of the two supported modes of operation explained at
/usr/share/doc/wpasupplicant/README.modes.gz.

ifupdown supports hot-plugged network devices via the "allow-hotplug" class
of operation. An example /etc/network/interfaces configuration stanza would
look like:

allow-hotplug wlan0
iface wlan0 inet dhcp
wpa-ssid myssid
wpa-psk mysecretpassphrase

network-manager is also able to handle hot-plugged network devices.

-- Kel Modderman <[email protected]> Mon, 14 Jan 2008 18:02:17 +1000
Loading
Loading