Hello community, here is the log from the commit of package patchinfo.3820 for openSUSE:13.2:Update checked in at 2015-06-11 13:39:16 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.3820 (Old) and /work/SRC/openSUSE:13.2:Update/.patchinfo.3820.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.3820" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="3820"> <packager>oertel</packager> <issue tracker="bnc" id="930079">VUL-0: CVE-2015-4143: wpa_supplicant: EAP-pwd missing payload length validation</issue> <issue tracker="bnc" id="930078">VUL-0: CVE-2015-4142: wpa_supplicant: Integer underflow in AP mode WMM Action frame processing</issue> <issue tracker="bnc" id="930077">VUL-0: CVE-2015-4141: wpa_supplicant: WPS UPnP vulnerability with HTTP chunked transfer encoding</issue> <issue tracker="cve" id="CVE-2015-4141"></issue> <issue tracker="cve" id="CVE-2015-4142"></issue> <issue tracker="cve" id="CVE-2015-4143"></issue> <category>security</category> <rating>moderate</rating> <summary>Recommended update for wpa_supplicant</summary> <description>wpa_supplicant was updated to fix three security issues. The following vulnerabilities were fixed: CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding (boo#930077) CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing (boo#930078) CVE-2015-4143: EAP-pwd missing payload length validation (boo#930079) </description> </patchinfo>
