Date: Tue, 19 Apr 2016 00:36:18 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r413617 - head/security/vuxml Message-ID: <201604190036.u3J0aIOL074344@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Tue Apr 19 00:36:17 2016 New Revision: 413617 URL: https://svnweb.freebsd.org/changeset/ports/413617 Log: Document wpa_supplicant security advisories PR: 208482 Security: CVE-2015-5310 Security: CVE-2015-5315 Security: CVE-2015-5316 Security: https://vuxml.FreeBSD.org/freebsd/976567f6-05c5-11e6-94fa-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Apr 18 23:28:09 2016 (r413616) +++ head/security/vuxml/vuln.xml Tue Apr 19 00:36:17 2016 (r413617) @@ -58,6 +58,46 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="976567f6-05c5-11e6-94fa-002590263bf5"> + <topic>wpa_supplicant -- multiple vulnerabilities</topic> + <affects> + <package> + <name>wpa_supplicant</name> + <range><lt>2.5_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jouni Malinen reports:</p> + <blockquote cite="http://w1.fi/security/2015-6/wpa_supplicant-unauthorized-wnm-sleep-mode-gtk-control.txt"> + <p>wpa_supplicant unauthorized WNM Sleep Mode GTK control. (2015-6 - + CVE-2015-5310)</p> + </blockquote> + <blockquote cite="http://w1.fi/security/2015-7/eap-pwd-missing-last-fragment-length-validation.txt"> + <p>EAP-pwd missing last fragment length validation. (2015-7 - + CVE-2015-5315)</p> + </blockquote> + <blockquote cite="http://w1.fi/security/2015-8/eap-pwd-unexpected-confirm.txt"> + <p>EAP-pwd peer error path failure on unexpected Confirm message. + (2015-8 - CVE-2015-5316)</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-5310</cvename> + <cvename>CVE-2015-5315</cvename> + <cvename>CVE-2015-5316</cvename> + <freebsdpr>ports/208482</freebsdpr> + <url>http://w1.fi/security/2015-6/wpa_supplicant-unauthorized-wnm-sleep-mode-gtk-control.txt</url> + <url>http://w1.fi/security/2015-7/eap-pwd-missing-last-fragment-length-validation.txt</url> + <url>http://w1.fi/security/2015-8/eap-pwd-unexpected-confirm.txt</url> + </references> + <dates> + <discovery>2015-11-10</discovery> + <entry>2016-04-19</entry> + </dates> + </vuln> + <vuln vid="092156c9-04d7-11e6-b1ce-002590263bf5"> <topic>dhcpcd -- remote code execution/denial of service</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201604190036.u3J0aIOL074344>