diff options
author | Fan Xin <fan.xin@jp.fujitsu.com> | 2015-08-05 11:41:32 +0900 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-09-01 21:19:40 +0100 |
commit | 982baf1130c41455fc3687fb5647a568742342bb (patch) | |
tree | 75a0e179d92ac32ac4d10cfbdc98c607d68f5268 /meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc | |
parent | 38f48913adfd640970a798a719fab6b8f1e888c5 (diff) | |
download | poky-982baf1130c41455fc3687fb5647a568742342bb.tar.gz |
wpa-supplicant: Fix CVE-2015-4141, CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
wpa-supplicant: backport patch to fix CVE-2015-4141,
CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146
Backport patch to fix CVE-2015-4141, CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146.
This patch is originally from:
For CVE-2015-4141:
http://w1.fi/security/2015-2/0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch
For CVE-2015-4143:
http://w1.fi/security/2015-4/0001-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch
http://w1.fi/security/2015-4/0002-EAP-pwd-server-Fix-payload-length-validation-for-Com.patch
For CVE-2015-4144 and CVE-2015-4145:
http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch
http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
For CVE-2015-4146:
http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch
(From OE-Core master rev: ce16e95de05db24e4e4132660d793cc7b1d890b9)
(From OE-Core rev: b236c0882d62d8aa722117a54c1ff9edec7f5a6d)
Signed-off-by: Fan Xin <fan.xin at jp.fujitsu.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Joshua Lock <joshua.lock@collabora.co.uk>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc')
-rw-r--r-- | meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc index b3e1465668..1d171ef25a 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc | |||
@@ -26,6 +26,12 @@ SRC_URI = "http://hostap.epitest.fi/releases/wpa_supplicant-${PV}.tar.gz \ | |||
26 | file://99_wpa_supplicant \ | 26 | file://99_wpa_supplicant \ |
27 | file://fix-libnl3-host-contamination.patch \ | 27 | file://fix-libnl3-host-contamination.patch \ |
28 | file://0001-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch \ | 28 | file://0001-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch \ |
29 | file://0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch \ | ||
30 | file://0001-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch \ | ||
31 | file://0002-EAP-pwd-server-Fix-payload-length-validation-for-Com.patch \ | ||
32 | file://0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch \ | ||
33 | file://0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch \ | ||
34 | file://0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch \ | ||
29 | " | 35 | " |
30 | SRC_URI[md5sum] = "f2ed8fef72cf63d8d446a2d0a6da630a" | 36 | SRC_URI[md5sum] = "f2ed8fef72cf63d8d446a2d0a6da630a" |
31 | SRC_URI[sha256sum] = "eaaa5bf3055270e521b2dff64f2d203ec8040f71958b8588269a82c00c9d7b6a" | 37 | SRC_URI[sha256sum] = "eaaa5bf3055270e521b2dff64f2d203ec8040f71958b8588269a82c00c9d7b6a" |