hostapd/wpa_supplicant - new stable release v0.5.11
Jouni Malinen
j
Fri Nov 28 08:38:00 PST 2008
New versions of wpa_supplicant and hostapd were just released and are
now available from http://w1.fi/
This release is a bug fix version from the stable (0.5.x) branch and
it replaces 0.5.10 as the recommended stable version.
hostapd:
* driver_madwifi: Fixed NULL pointer dereference on error path
[Bug 273]
* avoid possible NULL pointer dereference on SIGHUP with MAC ACLs
* update previous BSSID into STA data only after full validation of the
reassociation request
* avoid NULL pointer dereference if initialization of EAP-TTLS Phase 2
EAP method fails
wpa_supplicant:
* fixed race condition between disassociation event and group key
handshake to avoid getting stuck in incorrect state [Bug 261]
* updated D-Bus usage to avoid deprecated functions
* silence SIOCSIWAUTH ioctl failure message (these can be ignored in
most cases and are now only shown in debug output)
* increase timeout for IBSS connection
* driver_wext: do not overwrite BSS frequency if channel was already
received
* driver_wext: set interface down for mode switches, if needed (e.g.,
for mac80211)
* driver_wext: fixed re-initialization of a removed and re-inserted
interface (e.g., USB dongle or on resume if driver was unloaded for
suspend)
* improve per-SSID scanning for drivers that report background scan
results frequently
* fixed scanning behavior after a failed initial association
* driver_wext: fixed processing of invalid event messages from kernel
not to crash wpa_supplicant (this could happen when using 64-bit
kernel with 32-bit userspace)
* fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
not bytes
* fixed canceling of PMKSA caching when using drivers that generate
RSN IE and refuse to drop PMKIDs that wpa_supplicant does not know
about
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list