Dear Debian wpasupplicant Maintainers,
I noticed that these 3 RC bugs (#849122, #849077, #849875) are marked
as found in wpa/2.6-2, which is now superseded by versions with epoch 2.
What seems to have happened (please correct me, if I am wrong) is that
the upstream version 2.4 was reintroduced into unstable (with epoch 2)
and then migrated to stretch (before the stretch release as stable).

Hence, I would say that those three bugs only affect experimental and
are not in stretch, buster or sid.

Could you please confirm that these 3 bugs should be marked as fixed in
wpa/2:2.4-1 and found in wpa/2:2.6-4 ?

Thanks for your time!
Bye.


-- 
 http://www.inventati.org/frx/
 There's not a second to spare! To the laboratory!
..................................................... Francesco Poli .
 GnuPG key fpr == CA01 1147 9CD2 EFDF FB82  3925 3E1C 27E1 1F69 BFFE

Attachment: pgpciU3Jqqe2t.pgp
Description: PGP signature

Reply via email to