-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: wpa Binary: hostapd, wpagui, wpasupplicant, wpasupplicant-udeb Architecture: linux-any kfreebsd-any Version: 2.3-1+deb8u1 Maintainer: Debian wpasupplicant Maintainers <[email protected]> Uploaders: Kel Modderman <[email protected]>, Stefan Lippers-Hollmann <[email protected]>, Jan Dittberner <[email protected]> Homepage: http://w1.fi/wpa_supplicant/ Standards-Version: 3.9.6 Vcs-Browser: http://anonscm.debian.org/viewvc/pkg-wpa/wpa/trunk/ Vcs-Svn: svn://anonscm.debian.org/pkg-wpa/wpa/trunk/ Build-Depends: debhelper (>> 9.20120115), libdbus-1-dev, libssl-dev, libqt4-dev, libncurses5-dev, libpcsclite-dev, libnl-3-dev [linux-any], libnl-genl-3-dev [linux-any], libnl-route-3-dev [linux-any], libpcap-dev [kfreebsd-any], libbsd-dev [kfreebsd-any], libreadline-dev, pkg-config, qt4-qmake, docbook-to-man, docbook-utils Package-List: hostapd deb net optional arch=linux-any,kfreebsd-any wpagui deb net optional arch=linux-any,kfreebsd-any wpasupplicant deb net optional arch=linux-any,kfreebsd-any wpasupplicant-udeb udeb debian-installer standard arch=linux-any Checksums-Sha1: 7737a4306195ffaba8bb6777e2ede5a4a25e3ca0 1735544 wpa_2.3.orig.tar.xz 7a3efdcd8c6090b3acc80b339b9af9eb7b0ef74b 75404 wpa_2.3-1+deb8u1.debian.tar.xz Checksums-Sha256: 3d96034fa9e042c8aacb0812d8b2ab3d4c9aa6fc410802b4ee0da311e51c3eb3 1735544 wpa_2.3.orig.tar.xz 18dec2f1116ce66aae8b90d894370b750ace8559d4c25423bcee84d655f14e6a 75404 wpa_2.3-1+deb8u1.debian.tar.xz Files: d6dc9fa32a406506717ee6a4d076cd6d 1735544 wpa_2.3.orig.tar.xz d0f365b9276dc71eba04d6149bdb3ec7 75404 wpa_2.3-1+deb8u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVOVZ/AAoJEAVMuPMTQ89ErFAQAJ/JxjinYlw1zUZZE1c0wpKh 24UAeb7o+be9gprl2xC09YYIEuEWT5R1zo5XYpqzai7215wgklUGoDZhRzsvSYyL rdSvtUv2R1Fcd/zccrmaraAgpQBmo8DAhsuR9KEKlNw4OPBqdrTCWApBb75vXctc Q16NIrgVNb94/CsQ7MYChfHYabIzbVJswDqcxUt7pUDZ32Ihh5NmyN7U8Phj4V4y /UDYO9AycZEHfms2CZZmFkKV1vIxe0Vj/6GFgYmrKvFd3VUgKHCm7eaQebSNllOa 3sGN+og374Sa+YQRcD4anb3T2cXLbTJvn/FZFqrqQOjGpyaBOp4HpKWfKJ9Cc1Zj DkQYD4zD9Y/wOi7U67ICHeNycmDp792y5FpmBXBJJ74h3ZCGKURVIARASmemDQ2y NxriA1/77eIFYX3zyxaqQYew9R4ovzQeG85n0Y7jS4N+WI85+jVlim1CtCvshie8 5xG4XvPWYnWNQ2sltDSzGwtNxb4Bcf/HFw9oMagqMQKqJhj5LxcuSLy7ZaxULB/l ztbvDZbQjoAFF3Xeoj5HL9VkLXLkEUP5Qc2KCn3Wv1yAKqz7C0Y+th4NNCuVV5j7 93rqtXDhjPdEBNyr4olvGDbJSYP2HpI+8oQk5CrVZ4SSkhwlvaWhMSZSVkAutxVe 2L4aYTYOQtMYOeS/Jqag =YuYE -----END PGP SIGNATURE----- Changes: wpa (2.3-1+deb8u1) jessie-security; urgency=high * import "P2P: Validate SSID element length before copying it (CVE-2015-1863)" from upstream (Closes: #783148). -- Stefan Lippers-Hollmann <[email protected]> Thu, 23 Apr 2015 19:32:29 +0200