76db6b0dd0
Fixes: CVE-2015-5310 - wpa_supplicant unauthorized WNM Sleep Mode GTK control CVE-2015-5315 - wpa_supplicant: EAP-pwd missing last fragment length validation CVE-2015-5316 - EAP-pwd peer error path failure on unexpected Confirm message Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> |
||
---|---|---|
.. | ||
0001-fix-readline-libs-ordering.patch | ||
0002-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch | ||
0003-EAP-pwd-peer-Fix-last-fragment-length-validation.patch | ||
0004-EAP-pwd-server-Fix-last-fragment-length-validation.patch | ||
0005-EAP-pwd-peer-Fix-error-path-for-unexpected-Confirm-m.patch | ||
Config.in | ||
wpa_supplicant.conf | ||
wpa_supplicant.hash | ||
wpa_supplicant.mk |