From: Otavio Salvador Date: Mon, 10 Aug 2015 19:08:36 +0000 (-0300) Subject: wpa-supplicant: Fix CVE-2015-4142 X-Git-Tag: 2015-10~909 X-Git-Url: https://code.ossystems.io/gitweb?a=commitdiff_plain;h=2a8944b63b7249500f1b6b292ce1a87b82699f3d;p=openembedded-core.git wpa-supplicant: Fix CVE-2015-4142 The original commit "wpa-supplicant: Fix CVE-2015-4142" included the patch file but didn't apply it into the recipe, so the backport has not been effective. Reported-by: Adam Moore Signed-off-by: Otavio Salvador Signed-off-by: Ross Burton --- diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.4.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.4.bb index 0186c2be3d..a124cf21d9 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.4.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.4.bb @@ -24,6 +24,7 @@ SRC_URI = "http://hostap.epitest.fi/releases/wpa_supplicant-${PV}.tar.gz \ file://wpa_supplicant.conf \ file://wpa_supplicant.conf-sane \ file://99_wpa_supplicant \ + file://0001-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch \ file://0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch \ file://0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch \ file://0001-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch \