[Secure-testing-commits] r34622 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun May 31 20:42:24 UTC 2015


Author: carnil
Date: 2015-05-31 20:42:24 +0000 (Sun, 31 May 2015)
New Revision: 34622

Modified:
   data/CVE/list
Log:
Add bug reference for one wpa issue set, #787371

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-05-31 20:28:35 UTC (rev 34621)
+++ data/CVE/list	2015-05-31 20:42:24 UTC (rev 34622)
@@ -1204,7 +1204,7 @@
 	NOTE: https://bitbucket.org/jwilk/didjvu/issue/8
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/09/7
 CVE-2015-4146 [EAP-pwd missing payload length validation]
-	- wpa <unfixed>
+	- wpa <unfixed> (bug #787371)
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	NOTE: http://w1.fi/security/2015-4/
@@ -1212,7 +1212,7 @@
 	NOTE: http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4145 [EAP-pwd missing payload length validation]
-	- wpa <unfixed>
+	- wpa <unfixed> (bug #787371)
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	NOTE: http://w1.fi/security/2015-4/
@@ -1221,7 +1221,7 @@
 	NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4144 [EAP-pwd missing payload length validation]
-	- wpa <unfixed>
+	- wpa <unfixed> (bug #787371)
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	NOTE: http://w1.fi/security/2015-4/
@@ -1230,7 +1230,7 @@
 	NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4143 [EAP-pwd missing payload length validation]
-	- wpa <unfixed>
+	- wpa <unfixed> (bug #787371)
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	NOTE: http://w1.fi/security/2015-4/




More information about the Secure-testing-commits mailing list