Debian Patches

Status for wpa/2:2.11-2

Patch Description Author Forwarded Bugs Origin Last update
02_dbus_group_policy.patch Add D-Bus group policy
Debian does not use pam_console but uses group membership
to control access to D-Bus. Activating both options in the conf file
makes it work on Debian and Ubuntu.
Michael Biebl <biebl@debian.org> no debian 2007-03-08
07_dbus_service_syslog.patch Tweak D-Bus/systemd service activation configuration files:
* log wpa_supplicant messages to syslog
* activate control socket interface so that wpa_cli can be used by D-Bus
activated wpa_supplicant daemon
Kel Modderman <kel@otaku42.de> no 2012-04-21
allow-tlsv1.patch Enable TLSv1.0 by default
OpenSSL 1.1.1 disables TLSv1.0 by default and sets the security level to 2.
Some older networks may support for TLSv1.0 and less secure cyphers.
Andrej Shadura <andrewsh@debian.org> no 2018-12-15
disable-eapol-werror.patch Disable -Werror for eapol_test
This may make sense for the upstream, but we just want to build
the tool to be useful to our users; dealing with build errors due
to issues normally manifesting themselves as warnings is burdening
for Debian and its downstreams.
Andrej Shadura <andrew.shadura@collabora.co.uk> no 2021-02-12
wpa_service_ignore-on-isolate.patch Add IgnoreOnIsolate=yes to keep wpa-supplicant running while systemctl isolate

> Add IgnoreOnIsolate=yes so that when switching "runlevels" in
> oem-config will not kill off wpa and cause wireless to be
> unavailable on first boot. (LP: #1576024)

Also happens when running systemctl isolate default.target:

> NM should be detecting that wpasupplicant is not running and start
> it -- this should already have been working by way of wpasupplicant
> being dbus-activated.
[...]
> It seems to me like IgnoreOnIsolate for wpasupplicant would be the
> right thing to do, or to figure out why it isn't being properly
> started when NM tries to use it.
Mathieu Trudel-Lapierre <cyphermox@ubuntu.com> no 2017-03-13
systemd-add-reload-support.patch Add reload support to the systemd unit files
When wifi password is written in /etc/wpa_supplicant/wpa_supplicant-if.conf,
wpa_supplicant@if.service is started by systemd.
When one adds a new pair of SSID and its password in the above config
file, wpa_supplicant has to reload the changed config file.
But "systemctl reload" was not accepted because "ExecReload" was missing
from wpa_supplicant@.service.
Ryutaroh Matsumoto <ryutaroh.matsumoto@nagoya-u.jp> no debian 2019-07-08
manpage-replace-wheel-with-netdev.patch Replace the wheel group with netdev
wpa_supplicant.conf(5) manpage includes multiple examples with group wheel.
Group wheel does not exist on Debian as a result the example fails.
Thomas Glanzmann <thomas@glanzmann.de> no debian 2022-02-13
upstream-fixes/0001-nl80211-add-extra-ies-only-if-allowed-by-driver.patch nl80211: add extra-ies only if allowed by driver
Upgrading wpa_supplicant from 2.9 to 2.10 breaks broadcom-wl
based adapters. The reason for it is hostapd tries to install additional
IEs for scanning while the driver does not support this.

The kernel indicates the maximum number of bytes for additional scan IEs
using the NL80211_ATTR_MAX_SCAN_IE_LEN attribute. Save this value and
only add additional scan IEs in case the driver can accommodate these
additional IEs.
David Bauer <mail@david-bauer.net> yes debian upstream http://lists.infradead.org/pipermail/hostap/2022-January/040185.html 2022-01-30
allow-legacy-renegotiation.patch Allow legacy renegotiation to fix PEAP issues with some servers James Ralston <ralston@pobox.com> no 2022-05-01
wpa_service_netdev.patch Configure wpa_supplicant.service to create control sockets owned by group netdev Andrej Shadura <andrew.shadura@collabora.co.uk> no debian 2022-06-15
CVE-2024-5290-lib_engine_trusted_path.patch only load libraries from trusted path Marc Deslauriers <marc.deslauriers@canonical.com> no 2026-02-16
Bump-DEFAULT_BSS_MAX_COUNT-to-1000.patch Bump DEFAULT_BSS_MAX_COUNT to 1000
Many congested areas have more than 200 APs in range
of a typical device. When the number of APs exceeds
BSS_MAX_COUNT, even nearby APs can be absent from
the scanning device's AP list.
This patch bumps the default to 1000 to be more in
line with a realistic modern max number of APs
in a given area.
Mitchell Augustin <mitchell.augustin@canonical.com> no 2026-02-16
0013-Remove-misleading-wpa_cli-usage-comment.patch Remove misleading wpa_cli usage comment
# wpa_cli set
Selected interface 'wlan0'
Invalid SET command - at least 2 arguments are required.
Andrej Shadura <andrew.shadura@collabora.co.uk> no debian 2026-02-16
0014-sae_pk_gen-needs-random_get_bytes-wpa_key_mgmt_txt-w.patch sae_pk_gen needs random_get_bytes, wpa_key_mgmt_txt, wpa_akm_to_suite Andrej Shadura <andrew.shadura@collabora.co.uk> no 2026-02-16

All known versions for source package 'wpa'

Links