Hello, i want unsubscribe, but it's not work :/ You can help me please ? Regards,
Message with send [email protected]: It has been requested that the following address: [email protected] should be deleted from the debian-security mailing list. *Alexandre Clain* Gestion de projet | Analyste programmeur +33 (0)6 30 11 26 37 | http://alexandre.clain.info Twitter : twitter.com/alexandreclain | Facebook : facebook.com/aclain 2015-11-10 21:08 GMT+01:00 Salvatore Bonaccorso <[email protected]>: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-3397-1 [email protected] > https://www.debian.org/security/ Salvatore Bonaccorso > November 10, 2015 https://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : wpa > CVE ID : CVE-2015-4141 CVE-2015-4142 CVE-2015-4143 CVE-2015-4144 > CVE-2015-4145 CVE-2015-4146 CVE-2015-5310 CVE-2015-5314 > CVE-2015-5315 CVE-2015-5316 CVE-2015-8041 > Debian Bug : 787371 787372 787373 795740 804707 804708 804710 > > Several vulnerabilities have been discovered in wpa_supplicant and > hostapd. The Common Vulnerabilities and Exposures project identifies the > following problems: > > CVE-2015-4141 > > Kostya Kortchinsky of the Google Security Team discovered a > vulnerability in the WPS UPnP function with HTTP chunked transfer > encoding which may result in a denial of service. > > CVE-2015-4142 > > Kostya Kortchinsky of the Google Security Team discovered a > vulnerability in the WMM Action frame processing which may result in > a denial of service. > > CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146 > > Kostya Kortchinsky of the Google Security Team discovered that > EAP-pwd payload is not properly validated which may result in a > denial of service. > > CVE-2015-5310 > > Jouni Malinen discovered a flaw in the WMM Sleep Mode Response frame > processing. A remote attacker can take advantage of this flaw to > mount a denial of service. > > CVE-2015-5314 CVE-2015-5315 > > Jouni Malinen discovered a flaw in the handling of EAP-pwd messages > which may result in a denial of service. > > CVE-2015-5316 > > Jouni Malinen discovered a flaw in the handling of EAP-pwd Confirm > messages which may result in a denial of service. > > CVE-2015-8041 > > Incomplete WPS and P2P NFC NDEF record payload length validation may > result in a denial of service. > > For the oldstable distribution (wheezy), these problems have been fixed > in version 1.0-3+deb7u3. The oldstable distribution (wheezy) is only > affected by CVE-2015-4141, CVE-2015-4142, CVE-2015-4143 and > CVE-2015-8041. > > For the stable distribution (jessie), these problems have been fixed in > version 2.3-1+deb8u3. > > We recommend that you upgrade your wpa packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: https://www.debian.org/security/ > > Mailing list: [email protected] > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBCgAGBQJWQk59AAoJEAVMuPMTQ89EfRoQAI2Hzz2IVjv2/Vqs+Eb1jN7s > B1YeIISf83YOoSLXk1AdFp1irWIJR/1USKjlP3jm7Iedjz/nTqEr8k+4mjtaf1ap > QVj07KUhmQYWJqxqCtrOYh5FKMgwZ6pDGbZaU7W9dV0NTyaQ9Yfi7rz2qf87zKlg > rB66pMheTQVKwb60z2SLkRCzYxwcneVNt1k2YDymP4vthyjqDD3Hr/xkNQmOpYxD > ZZBUVdj2VszBrvQI/7X1zb36viQrTSY/LtiL7V+ouQRQW2iRItHV6UgisKTxqLrc > mxFHO910KexOYUlClShvy+uxPcNEFciY+WXJWk6C/vnWn3kgCePEMfHKnmyqpRHX > /cpv/tClt9fbkv8pd+pdFKvDT4nUeRkKMvjA788nhB0JsAUpJBV2zM1/OqnqSpEy > AkKJpBrAva63k44vrBSpMLQeZph3O4XQxVxd3GQUbnqff/QgfNdt3IZKejieEtr9 > aGB9MEbACObsHfJMsyMKTas4wHjUjttli9dv1EjAo+l76uVwqsSsCjkd3hpwGTAa > RfPtr406t8S6mJHUHiAnVGBaDRFLNj+GN4VUI03TY1xV+SryDDwvvNt6mqLPwYGQ > DrkzMvNdpbZeeAZx4Lktwk3VHHqctpSWxh26+hZu/1gSn2fJt4IBAnuvR7U61L/s > dmbD9IrwgfWdrmSOe/8e > =oQsm > -----END PGP SIGNATURE----- > >

