Debian Patches
Status for wpa/2:2.11-2
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| 02_dbus_group_policy.patch | Add D-Bus group policy Debian does not use pam_console but uses group membership to control access to D-Bus. Activating both options in the conf file makes it work on Debian and Ubuntu. |
Michael Biebl <biebl@debian.org> | no | debian | 2007-03-08 | |
| 07_dbus_service_syslog.patch | Tweak D-Bus/systemd service activation configuration files: * log wpa_supplicant messages to syslog * activate control socket interface so that wpa_cli can be used by D-Bus activated wpa_supplicant daemon |
Kel Modderman <kel@otaku42.de> | no | 2012-04-21 | ||
| allow-tlsv1.patch | Enable TLSv1.0 by default OpenSSL 1.1.1 disables TLSv1.0 by default and sets the security level to 2. Some older networks may support for TLSv1.0 and less secure cyphers. |
Andrej Shadura <andrewsh@debian.org> | no | 2018-12-15 | ||
| disable-eapol-werror.patch | Disable -Werror for eapol_test This may make sense for the upstream, but we just want to build the tool to be useful to our users; dealing with build errors due to issues normally manifesting themselves as warnings is burdening for Debian and its downstreams. |
Andrej Shadura <andrew.shadura@collabora.co.uk> | no | 2021-02-12 | ||
| wpa_service_ignore-on-isolate.patch | Add IgnoreOnIsolate=yes to keep wpa-supplicant running while systemctl isolate > Add IgnoreOnIsolate=yes so that when switching "runlevels" in > oem-config will not kill off wpa and cause wireless to be > unavailable on first boot. (LP: #1576024) Also happens when running systemctl isolate default.target: > NM should be detecting that wpasupplicant is not running and start > it -- this should already have been working by way of wpasupplicant > being dbus-activated. [...] > It seems to me like IgnoreOnIsolate for wpasupplicant would be the > right thing to do, or to figure out why it isn't being properly > started when NM tries to use it. |
Mathieu Trudel-Lapierre <cyphermox@ubuntu.com> | no | 2017-03-13 | ||
| systemd-add-reload-support.patch | Add reload support to the systemd unit files When wifi password is written in /etc/wpa_supplicant/wpa_supplicant-if.conf, wpa_supplicant@if.service is started by systemd. When one adds a new pair of SSID and its password in the above config file, wpa_supplicant has to reload the changed config file. But "systemctl reload" was not accepted because "ExecReload" was missing from wpa_supplicant@.service. |
Ryutaroh Matsumoto <ryutaroh.matsumoto@nagoya-u.jp> | no | debian | 2019-07-08 | |
| manpage-replace-wheel-with-netdev.patch | Replace the wheel group with netdev wpa_supplicant.conf(5) manpage includes multiple examples with group wheel. Group wheel does not exist on Debian as a result the example fails. |
Thomas Glanzmann <thomas@glanzmann.de> | no | debian | 2022-02-13 | |
| upstream-fixes/0001-nl80211-add-extra-ies-only-if-allowed-by-driver.patch | nl80211: add extra-ies only if allowed by driver Upgrading wpa_supplicant from 2.9 to 2.10 breaks broadcom-wl based adapters. The reason for it is hostapd tries to install additional IEs for scanning while the driver does not support this. The kernel indicates the maximum number of bytes for additional scan IEs using the NL80211_ATTR_MAX_SCAN_IE_LEN attribute. Save this value and only add additional scan IEs in case the driver can accommodate these additional IEs. |
David Bauer <mail@david-bauer.net> | yes | debian upstream | http://lists.infradead.org/pipermail/hostap/2022-January/040185.html | 2022-01-30 |
| allow-legacy-renegotiation.patch | Allow legacy renegotiation to fix PEAP issues with some servers | James Ralston <ralston@pobox.com> | no | 2022-05-01 | ||
| wpa_service_netdev.patch | Configure wpa_supplicant.service to create control sockets owned by group netdev | Andrej Shadura <andrew.shadura@collabora.co.uk> | no | debian | 2022-06-15 | |
| CVE-2024-5290-lib_engine_trusted_path.patch | only load libraries from trusted path | Marc Deslauriers <marc.deslauriers@canonical.com> | no | 2026-02-16 | ||
| Bump-DEFAULT_BSS_MAX_COUNT-to-1000.patch | Bump DEFAULT_BSS_MAX_COUNT to 1000 Many congested areas have more than 200 APs in range of a typical device. When the number of APs exceeds BSS_MAX_COUNT, even nearby APs can be absent from the scanning device's AP list. This patch bumps the default to 1000 to be more in line with a realistic modern max number of APs in a given area. |
Mitchell Augustin <mitchell.augustin@canonical.com> | no | 2026-02-16 | ||
| 0013-Remove-misleading-wpa_cli-usage-comment.patch | Remove misleading wpa_cli usage comment # wpa_cli set Selected interface 'wlan0' Invalid SET command - at least 2 arguments are required. |
Andrej Shadura <andrew.shadura@collabora.co.uk> | no | debian | 2026-02-16 | |
| 0014-sae_pk_gen-needs-random_get_bytes-wpa_key_mgmt_txt-w.patch | sae_pk_gen needs random_get_bytes, wpa_key_mgmt_txt, wpa_akm_to_suite | Andrej Shadura <andrew.shadura@collabora.co.uk> | no | 2026-02-16 |
All known versions for source package 'wpa'
- 2:2.11-2 (experimental)
- 2:2.10-25 (sid, forky)
- 2:2.10-24 (trixie)
- 2:2.10-12+deb12u3 (bookworm)
- 2:2.10-12+deb12u2 (bookworm-security)
