-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 31 Oct 2015 14:13:50 +0100 Source: wpa Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb Architecture: source Version: 2.3-2.2 Distribution: unstable Urgency: high Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-de...@lists.alioth.debian.org> Changed-By: Salvatore Bonaccorso <car...@debian.org> Closes: 787371 787372 787373 795740 Description: hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator wpagui - graphical user interface for wpa_supplicant wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i) wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb) Changes: wpa (2.3-2.2) unstable; urgency=high . * Non-maintainer upload. * Add patch to address CVE-2015-4141. CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding. (Closes: #787372) * Add patch to address CVE-2015-4142. CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing. (Closes: #787373) * Add patches to address CVE-2015-414{3,4,5,6} CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146: EAP-pwd missing payload length validation. (Closes: #787371) * Add patch to address 2015-5 vulnerability. NFC: Fix payload length validation in NDEF record parser (Closes: #795740) * Thanks to Julian Wollrath <jwollr...@web.de> for the initial debdiff provided in #787371. Checksums-Sha1: 75150beb3fb26d4109b539b4ce888463998878d6 2444 wpa_2.3-2.2.dsc 328926f300bcae025a18b0009dc873ffbcbb5c12 84500 wpa_2.3-2.2.debian.tar.xz Checksums-Sha256: 53a491d3de23b568ccbb368bfc417d20aff2d2c92d74ddd3c0569e187ae3611d 2444 wpa_2.3-2.2.dsc 89a6cd317af34695d7aa4ff8d1e3b8c80de03d86b338935d8605cdb89a3b8789 84500 wpa_2.3-2.2.debian.tar.xz Files: 4a754d8ca6b01384f4dcc853d250c943 2444 net optional wpa_2.3-2.2.dsc db6f18f88aace7294e99d65d53440140 84500 net optional wpa_2.3-2.2.debian.tar.xz
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWNMGdAAoJEAVMuPMTQ89EkzYP/2gtvy7H22t6nEas+tUyxTpm nhb2VQ2tnh373DBA5fypjJhBku+F8/vlEyhVC8zsbYfH+4NdS7lgJjrl/IW1tjct 9ZBlcGFKLbtMliQzTID4/Q2oKNodgyBFsWhno8ZgOw6pa9W/bUf5KNtbADHq9fv6 lxXOxgrUnICtKwU8rGU0h0gpnEjl+OLGC1P7r+jnIpXvfjdG7x5X3Nadnlfw9tHo kXErE2npfXfZzUv3Y2/0KnWV/IRdmD/+8IdwvCGSM4TTZdOpXViZEh6K7ioWX8nJ kRS83YjPnQNaj0WB+d+4gzneCoqh29q6oLqhTp4hJ46vCSMP64tbsolvYbYBpa5y zeUQeYXlOnN2HH8zFqzp4dN8CD6rfT2Cv9Co12YMizglLt+Y5qatNiQi5EXUr3be cUA/e22gzVj21dqP2OwI9zuOFOR75Q2dSB/eZ9fexri89xFKj8D7fI6XrrMz9Jx4 ABaRiWk5k6vAgrcjPrzBFgH+HmkL7QBlfYjLwCdfa1Pz02tk33qH67I0Fz7mTOfe +dAiXW/D+outNErQDIrhWVYkOqKTAnmktNUej6+fUs9mmzKq6ZFSbSXIAIWzlENa flxIxSGjFYL7e2qRn1Eti4ffZOcdYgOf9yCINgYG+uCR/QtFtb5IY9suW1j/pL/h eB4GpTyvWzWeJZ87ooIg =SIcU -----END PGP SIGNATURE-----