Hello community,

here is the log from the commit of package patchinfo.3820 for 
openSUSE:13.2:Update checked in at 2015-06-11 13:39:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.3820 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.3820.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.3820"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="3820">
  <packager>oertel</packager>
  <issue tracker="bnc" id="930079">VUL-0: CVE-2015-4143: wpa_supplicant: 
EAP-pwd missing payload length validation</issue>
  <issue tracker="bnc" id="930078">VUL-0: CVE-2015-4142: wpa_supplicant: 
Integer underflow in AP mode WMM Action frame processing</issue>
  <issue tracker="bnc" id="930077">VUL-0: CVE-2015-4141: wpa_supplicant: WPS 
UPnP vulnerability with HTTP chunked transfer encoding</issue>
  <issue tracker="cve" id="CVE-2015-4141"></issue>
  <issue tracker="cve" id="CVE-2015-4142"></issue>
  <issue tracker="cve" id="CVE-2015-4143"></issue>
  <category>security</category>
  <rating>moderate</rating>
  <summary>Recommended update for wpa_supplicant</summary>
  <description>wpa_supplicant was updated to fix three security issues.

The following vulnerabilities were fixed:

CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding 
(boo#930077)
CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing 
(boo#930078)
CVE-2015-4143: EAP-pwd missing payload length validation (boo#930079)
</description>
</patchinfo>

Reply via email to