Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
patchinfo.689
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.689
<patchinfo incident="689"> <issue id="930079" tracker="bnc">CVE-2015-4143: EAP-pwd missing payload length validation</issue> <issue id="930078" tracker="bnc">CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing</issue> <issue id="930077" tracker="bnc">CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding</issue> <issue id="952254" tracker="bnc">CVE-2015-5310: wpa_supplicant unauthorized WNM Sleep Mode GTK control</issue> <issue id="937419" tracker="bnc">CVE-2015-8041: Incomplete WPS and P2P NFC NDEF record payload length validation</issue> <issue id="2015-4142" tracker="cve" /> <issue id="2015-4143" tracker="cve" /> <issue id="2015-4141" tracker="cve" /> <issue id="2015-5310" tracker="cve" /> <issue id="2015-8041" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>AndreasStieger</packager> <description> This update for wpa_supplicant fixes the following issues: - CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding. (bnc#930077) - CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing. (bnc#930078) - CVE-2015-4143: EAP-pwd missing payload length validation. (bnc#930079) - CVE-2015-5310: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in use. (bsc#952254) - CVE-2015-8041: Fix payload length validation in NDEF record parser. (bsc#937419) </description> <summary>Security update for wpa_supplicant</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor