Author: carnil Date: 2015-05-31 20:28:35 +0000 (Sun, 31 May 2015) New Revision: 34621
Modified: data/CVE/list Log: Add back lost reference to original CVE request Modified: data/CVE/list =================================================================== --- data/CVE/list 2015-05-31 20:18:25 UTC (rev 34620) +++ data/CVE/list 2015-05-31 20:28:35 UTC (rev 34621) @@ -1210,6 +1210,7 @@ NOTE: http://w1.fi/security/2015-4/ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch + NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4145 [EAP-pwd missing payload length validation] - wpa <unfixed> - wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y) @@ -1218,6 +1219,7 @@ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch + NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4144 [EAP-pwd missing payload length validation] - wpa <unfixed> - wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y) @@ -1226,6 +1228,7 @@ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch + NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4143 [EAP-pwd missing payload length validation] - wpa <unfixed> - wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y) @@ -1234,6 +1237,7 @@ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0001-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch NOTE: http://w1.fi/security/2015-4/0002-EAP-pwd-server-Fix-payload-length-validation-for-Com.patch + NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4142 [Integer underflow in AP mode WMM Action frame processing] - wpa <unfixed> - wpasupplicant <removed> _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits