[Secure-testing-commits] r37505 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Nov 2 12:30:24 UTC 2015


Author: carnil
Date: 2015-11-02 12:30:24 +0000 (Mon, 02 Nov 2015)
New Revision: 37505

Modified:
   data/CVE/list
Log:
Add fixed version for wpa issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-11-02 11:53:32 UTC (rev 37504)
+++ data/CVE/list	2015-11-02 12:30:24 UTC (rev 37505)
@@ -6678,7 +6678,7 @@
 CVE-2011-5322 (GE Healthcare Centricity Analytics Server 1.1 has a default password ...)
 	NOT-FOR-US: GE Healthcare Centricity Analytics Server
 CVE-2015-XXXX [Incomplete WPS and P2P NFC NDEF record payload length validation]
-	- wpa <unfixed> (bug #795740)
+	- wpa 2.3-2.2 (bug #795740)
 	- wpasupplicant <removed>
 	[squeeze] - wpasupplicant <not-affected> (0.7.0-v2.4 with with CONFIG_WPS_NFC=y)
 	- hostapd <removed>
@@ -11516,7 +11516,7 @@
 	NOTE: https://bitbucket.org/jwilk/didjvu/issue/8
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/09/7
 CVE-2015-4146 (The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 ...)
-	- wpa <unfixed> (bug #787371)
+	- wpa 2.3-2.2 (bug #787371)
 	[wheezy] - wpa <not-affected> (Vulnerable code introduced later)
 	NOTE: support for fragmentation added in https://w1.fi/cgit/hostap/commit/?id=5ea93947ca67ba83529798b806a15b247cdb2e93
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
@@ -11526,7 +11526,7 @@
 	NOTE: http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4145 (The EAP-pwd server and peer implementation in hostapd and ...)
-	- wpa <unfixed> (bug #787371)
+	- wpa 2.3-2.2 (bug #787371)
 	[wheezy] - wpa <not-affected> (Vulnerable code introduced later)
 	NOTE: support for fragmentation added in https://w1.fi/cgit/hostap/commit/?id=5ea93947ca67ba83529798b806a15b247cdb2e93
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
@@ -11537,7 +11537,7 @@
 	NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4144 (The EAP-pwd server and peer implementation in hostapd and ...)
-	- wpa <unfixed> (bug #787371)
+	- wpa 2.3-2.2 (bug #787371)
 	[wheezy] - wpa <not-affected> (Vulnerable code introduced later)
 	NOTE: support for fragmentation added in https://w1.fi/cgit/hostap/commit/?id=5ea93947ca67ba83529798b806a15b247cdb2e93
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
@@ -11548,7 +11548,7 @@
 	NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4143 (The EAP-pwd server and peer implementation in hostapd and ...)
-	- wpa <unfixed> (bug #787371)
+	- wpa 2.3-2.2 (bug #787371)
 	- wpasupplicant <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	- hostapd <not-affected> (v1.0-v2.4 with CONFIG_EAP_PWD=y)
 	NOTE: http://w1.fi/security/2015-4/
@@ -11558,7 +11558,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5
 CVE-2015-4142 (Integer underflow in the WMM Action frame parser in hostapd 0.5.5 ...)
 	{DLA-260-1}
-	- wpa <unfixed> (bug #787373)
+	- wpa 2.3-2.2 (bug #787373)
 	- wpasupplicant <removed>
 	[squeeze] - wpasupplicant <not-affected> (0.7.0-v2.4 with with specific configurations)
 	- hostapd <removed>
@@ -11566,7 +11566,7 @@
 	NOTE: http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/09/5
 CVE-2015-4141 (The WPS UPnP function in hostapd, when using WPS AP, and ...)
-	- wpa <unfixed> (bug #787372)
+	- wpa 2.3-2.2 (bug #787372)
 	- wpasupplicant <removed> (unimportant)
 	[squeeze] - wpasupplicant <not-affected> (Affects v0.7.0-v2.4 with CONFIG_WPS_ER=y in the build configuration)
 	- hostapd <removed>




More information about the Secure-testing-commits mailing list