]> code.ossystems Code Review - openembedded-core.git/commit
wpa_supplicant: Security Advisory-CVE-2016-4476
authorZhixiong Chi <zhixiong.chi@windriver.com>
Thu, 22 Sep 2016 07:54:20 +0000 (15:54 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 27 Sep 2016 08:05:16 +0000 (09:05 +0100)
commit6ef620c717c43a29f51ccd298c84070552bdfe52
tree43b7e73f5a15b5178d622112b5ab3868f46d9cd0
parentc3110b9a360571f308123b23f7c99500362b4987
wpa_supplicant: Security Advisory-CVE-2016-4476

Add CVE-2016-4476 patch for avoiding \n and \r characters in passphrase
parameters, which allows remote attackers to cause a denial of service
(daemon outage) via a crafted WPS operation.
Patches came from http://w1.fi/security/2016-1/

(From OE-Core rev: ed610b68f7e19644c89d7131e34c990a02403c62)

Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0002-Remove-newlines-from-wpa_supplicant-config-network-o.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.5.bb