From: Joshua Lock Date: Tue, 14 Jul 2015 12:52:55 +0000 (+0100) Subject: wpa-supplicant: Apply fix CVE-2015-4142 X-Git-Url: https://code.ossystems.io/gitweb?a=commitdiff_plain;h=375674fa5f2534198036be60972d39e1e6793d3a;p=openembedded-core.git wpa-supplicant: Apply fix CVE-2015-4142 The cherry-pick from the master branch added the patch file but didn't apply it in the recipe. Signed-off-by: Joshua Lock --- diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc index f95e91c999..b3e1465668 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc @@ -25,6 +25,7 @@ SRC_URI = "http://hostap.epitest.fi/releases/wpa_supplicant-${PV}.tar.gz \ file://wpa_supplicant.conf-sane \ file://99_wpa_supplicant \ file://fix-libnl3-host-contamination.patch \ + file://0001-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch \ " SRC_URI[md5sum] = "f2ed8fef72cf63d8d446a2d0a6da630a" SRC_URI[sha256sum] = "eaaa5bf3055270e521b2dff64f2d203ec8040f71958b8588269a82c00c9d7b6a"