[ubuntu/xenial-proposed] wpa 2.4-0ubuntu5 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue Nov 10 18:55:31 UTC 2015


wpa (2.4-0ubuntu5) xenial; urgency=medium

  * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
    - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
      Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
    - CVE-2015-5310
  * SECURITY UPDATE: EAP-pwd missing last fragment length validation
    - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
      validation in src/eap_peer/eap_pwd.c.
    - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
      validation in src/eap_server/eap_server_pwd.c.
    - CVE-2015-5315
  * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
    message
    - debian/patches/CVE-2015-5316.patch: fix error path in
      src/eap_peer/eap_pwd.c.
    - CVE-2015-5316
  * SECURITY UPDATE: denial of service in NDEF record parser
    - debian/patches/CVE-2015-8041.patch: validate payload lengths in
      src/wps/ndef.c.
    - CVE-2015-8041

Date: Tue, 10 Nov 2015 13:38:25 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu5
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 10 Nov 2015 13:38:25 -0500
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.4-0ubuntu5
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Changes:
 wpa (2.4-0ubuntu5) xenial; urgency=medium
 .
   * SECURITY UPDATE: unauthorized WNM Sleep Mode GTK control
     - debian/patches/CVE-2015-5310.patch: Ignore Key Data in WNM Sleep Mode
       Response frame if no PMF in use in wpa_supplicant/wnm_sta.c.
     - CVE-2015-5310
   * SECURITY UPDATE: EAP-pwd missing last fragment length validation
     - debian/patches/CVE-2015-5315-1.patch: Fix last fragment length
       validation in src/eap_peer/eap_pwd.c.
     - debian/patches/CVE-2015-5315-2.patch: Fix last fragment length
       validation in src/eap_server/eap_server_pwd.c.
     - CVE-2015-5315
   * SECURITY UPDATE: EAP-pwd peer error path failure on unexpected Confirm
     message
     - debian/patches/CVE-2015-5316.patch: fix error path in
       src/eap_peer/eap_pwd.c.
     - CVE-2015-5316
   * SECURITY UPDATE: denial of service in NDEF record parser
     - debian/patches/CVE-2015-8041.patch: validate payload lengths in
       src/wps/ndef.c.
     - CVE-2015-8041
Checksums-Sha1:
 6431474eadd8b7b8eefc663aff79b398f5c23a61 2560 wpa_2.4-0ubuntu5.dsc
 763b1ef030fa19ce49eed18f81ff60d694e5ba55 88068 wpa_2.4-0ubuntu5.debian.tar.xz
Checksums-Sha256:
 d4e1d55d57cfe5cb518589c221ec03fc8a6eb4519387db7f5b320f53008643f1 2560 wpa_2.4-0ubuntu5.dsc
 bb2ce17f4e940ffe290da2aadc0f3c222a38b7c72f6b56bacb041d00233597da 88068 wpa_2.4-0ubuntu5.debian.tar.xz
Files:
 6401871d8875ae412cffe86593e209bc 2560 net optional wpa_2.4-0ubuntu5.dsc
 9f36037b1bf3bdb9ed1bcb59bcfd5dc1 88068 net optional wpa_2.4-0ubuntu5.debian.tar.xz
Original-Maintainer: Debian wpasupplicant Maintainers <pkg-wpa-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=7iIR
-----END PGP SIGNATURE-----


More information about the Xenial-changes mailing list