~okay19/ubuntu/wily/wpa/fix-bug-1405452

Viewing all changes in revision 19.

  • Committer: Package Import Robot
  • Author(s): Marc Deslauriers
  • Date: 2015-06-15 10:21:54 UTC
  • Revision ID: package-import@ubuntu.com-20150615102154-ddefaqfiv96swpkb
Tags: 2.1-0ubuntu8
* SECURITY UPDATE: memcpy overflow in P2P functionality
  - debian/patches/CVE-2015-1863.patch: validate SID element length in
    src/p2p/p2p.c.
  - CVE-2015-1863
* SECURITY UPDATE: denial of service via WPS UPnP
  - debian/patches/CVE-2015-4141.patch: check chunk size in
    src/wps/httpread.c.
  - CVE-2015-4141
* SECURITY UPDATE: denial of service via AP mode WMM Action frame
  - debian/patches/CVE-2015-4142.patch: check length in src/ap/wmm.c.
  - CVE-2015-4142
* SECURITY UPDATE: denial of service via EAP-pwd
  - debian/patches/CVE-2015-4143-4146.patch: check lengths in
    src/eap_peer/eap_pwd.c, src/eap_server/eap_server_pwd.c.
  - CVE-2015-4143
  - CVE-2015-4144
  - CVE-2015-4145
  - CVE-2015-4146

expand all expand all

Show diffs side-by-side

added added

removed removed

Lines of Context: