Fedora 20 Security Update: async-http-client-1.7.22-2.fc20

Resolved Bugs
1133787 – CVE-2013-7398 async-http-client: missing hostname verification for SSL certificates [fedora-all]
1133773 – CVE-2013-7398 async-http-client: missing hostname verification for SSL certificates
1133789 – CVE-2013-7397 async-http-client: SSL/TLS certificate verification is disabled under certain conditions [fedora-all]
1133769 – CVE-2013-7397 async-http-client: SSL/TLS certificate verification is disabled under certain conditions<br
Security fix for CVE-2013-7398, CVE-2013-7397

Fedora 22 Security Update: wpa_supplicant-2.3-3.fc22

This update addresses a security vulnerability identified as CVE-2015-1863 . More information on this vulnerability is provided by upstream at https://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt . An extract:
Attacker (or a system controlled by the attacker) needs to be within radio range of the vulnerable system to send a suitably constructed management frame that triggers a P2P peer device information to be created or updated.
The vulnerability is easiest to exploit while the device has started an active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control interface command in progress). However, it may be possible, though significantly more difficult, to trigger this even without any active P2P operation in progress.

Fedora 21 Security Update: wpa_supplicant-2.0-13.fc21

This update addresses a security vulnerability identified as CVE-2015-1863 . More information on this vulnerability is provided by upstream at https://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt . An extract:
Attacker (or a system controlled by the attacker) needs to be within radio range of the vulnerable system to send a suitably constructed management frame that triggers a P2P peer device information to be created or updated.
The vulnerability is easiest to exploit while the device has started an active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control interface command in progress). However, it may be possible, though significantly more difficult, to trigger this even without any active P2P operation in progress.