[Secure-testing-commits] r34620 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sun May 31 20:18:25 UTC 2015
Author: carnil
Date: 2015-05-31 20:18:25 +0000 (Sun, 31 May 2015)
New Revision: 34620
Modified:
data/CVE/list
Log:
Add links for advisory text
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2015-05-31 20:17:12 UTC (rev 34619)
+++ data/CVE/list 2015-05-31 20:18:25 UTC (rev 34620)
@@ -1208,12 +1208,14 @@
- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
NOTE: http://w1.fi/security/2015-4/
+ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
NOTE: http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch
CVE-2015-4145 [EAP-pwd missing payload length validation]
- wpa <unfixed>
- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
NOTE: http://w1.fi/security/2015-4/
+ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
NOTE: http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch
NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
CVE-2015-4144 [EAP-pwd missing payload length validation]
@@ -1221,6 +1223,7 @@
- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
NOTE: http://w1.fi/security/2015-4/
+ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
NOTE: http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch
NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
CVE-2015-4143 [EAP-pwd missing payload length validation]
More information about the Secure-testing-commits
mailing list