Dear Debian wpasupplicant Maintainers, I noticed that these 3 RC bugs (#849122, #849077, #849875) are marked as found in wpa/2.6-2, which is now superseded by versions with epoch 2. What seems to have happened (please correct me, if I am wrong) is that the upstream version 2.4 was reintroduced into unstable (with epoch 2) and then migrated to stretch (before the stretch release as stable).
Hence, I would say that those three bugs only affect experimental and are not in stretch, buster or sid. Could you please confirm that these 3 bugs should be marked as fixed in wpa/2:2.4-1 and found in wpa/2:2.6-4 ? Thanks for your time! Bye. -- http://www.inventati.org/frx/ There's not a second to spare! To the laboratory! ..................................................... Francesco Poli . GnuPG key fpr == CA01 1147 9CD2 EFDF FB82 3925 3E1C 27E1 1F69 BFFE
pgpciU3Jqqe2t.pgp
Description: PGP signature