News for package wpa

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 3.0 (quilt)
Source: wpa
Binary: hostapd, wpagui, wpasupplicant, wpasupplicant-udeb
Architecture: linux-any kfreebsd-any
Version: 2.3-1+deb8u1
Maintainer: Debian wpasupplicant Maintainers <[email protected]>
Uploaders: Kel Modderman <[email protected]>, Stefan Lippers-Hollmann <[email protected]>, Jan Dittberner <[email protected]>
Homepage: http://w1.fi/wpa_supplicant/
Standards-Version: 3.9.6
Vcs-Browser: http://anonscm.debian.org/viewvc/pkg-wpa/wpa/trunk/
Vcs-Svn: svn://anonscm.debian.org/pkg-wpa/wpa/trunk/
Build-Depends: debhelper (>> 9.20120115), libdbus-1-dev, libssl-dev, libqt4-dev, libncurses5-dev, libpcsclite-dev, libnl-3-dev [linux-any], libnl-genl-3-dev [linux-any], libnl-route-3-dev [linux-any], libpcap-dev [kfreebsd-any], libbsd-dev [kfreebsd-any], libreadline-dev, pkg-config, qt4-qmake, docbook-to-man, docbook-utils
Package-List:
 hostapd deb net optional arch=linux-any,kfreebsd-any
 wpagui deb net optional arch=linux-any,kfreebsd-any
 wpasupplicant deb net optional arch=linux-any,kfreebsd-any
 wpasupplicant-udeb udeb debian-installer standard arch=linux-any
Checksums-Sha1:
 7737a4306195ffaba8bb6777e2ede5a4a25e3ca0 1735544 wpa_2.3.orig.tar.xz
 7a3efdcd8c6090b3acc80b339b9af9eb7b0ef74b 75404 wpa_2.3-1+deb8u1.debian.tar.xz
Checksums-Sha256:
 3d96034fa9e042c8aacb0812d8b2ab3d4c9aa6fc410802b4ee0da311e51c3eb3 1735544 wpa_2.3.orig.tar.xz
 18dec2f1116ce66aae8b90d894370b750ace8559d4c25423bcee84d655f14e6a 75404 wpa_2.3-1+deb8u1.debian.tar.xz
Files:
 d6dc9fa32a406506717ee6a4d076cd6d 1735544 wpa_2.3.orig.tar.xz
 d0f365b9276dc71eba04d6149bdb3ec7 75404 wpa_2.3-1+deb8u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=YuYE
-----END PGP SIGNATURE-----

Changes:
wpa (2.3-1+deb8u1) jessie-security; urgency=high

  * import "P2P: Validate SSID element length before copying it
    (CVE-2015-1863)" from upstream (Closes: #783148).

 -- Stefan Lippers-Hollmann <[email protected]>  Thu, 23 Apr 2015 19:32:29 +0200