hostapd/wpa_supplicant - new stable release v0.5.11

Jouni Malinen j
Fri Nov 28 08:38:00 PST 2008


New versions of wpa_supplicant and hostapd were just released and are
now available from http://w1.fi/

This release is a bug fix version from the stable (0.5.x) branch and
it replaces 0.5.10 as the recommended stable version.

hostapd:
* driver_madwifi: Fixed NULL pointer dereference on error path
  [Bug 273]
* avoid possible NULL pointer dereference on SIGHUP with MAC ACLs
* update previous BSSID into STA data only after full validation of the
  reassociation request
* avoid NULL pointer dereference if initialization of EAP-TTLS Phase 2
  EAP method fails

wpa_supplicant:
* fixed race condition between disassociation event and group key
  handshake to avoid getting stuck in incorrect state [Bug 261]
* updated D-Bus usage to avoid deprecated functions
* silence SIOCSIWAUTH ioctl failure message (these can be ignored in
  most cases and are now only shown in debug output)
* increase timeout for IBSS connection
* driver_wext: do not overwrite BSS frequency if channel was already
  received
* driver_wext: set interface down for mode switches, if needed (e.g.,
  for mac80211)
* driver_wext: fixed re-initialization of a removed and re-inserted
  interface (e.g., USB dongle or on resume if driver was unloaded for
  suspend)
* improve per-SSID scanning for drivers that report background scan
  results frequently
* fixed scanning behavior after a failed initial association
* driver_wext: fixed processing of invalid event messages from kernel
  not to crash wpa_supplicant (this could happen when using 64-bit
  kernel with 32-bit userspace)
* fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
  not bytes
* fixed canceling of PMKSA caching when using drivers that generate
  RSN IE and refuse to drop PMKIDs that wpa_supplicant does not know
  about

-- 
Jouni Malinen                                            PGP id EFC895FA



More information about the Hostap mailing list