forked from mirror/openwrt
This fixes the following security problems: * CVE-2018-14618: NTLM password overflow via integer overflow * CVE-2018-16839: SASL password overflow via integer overflow * CVE-2018-16840: use-after-free in handle close * CVE-2018-16842: warning message out-of-buffer read * CVE-2019-3823: SMTP end-of-response out-of-bounds read * CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow * CVE-2018-16890: NTLM type-2 out-of-bounds buffer read Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> |
||
|---|---|---|
| .. | ||
| 200-no_docs_tests.patch | ||
| 310-mbedtls-disable-runtime-version-check.patch | ||
| 400-CVE-2018-0500.patch | ||
| 401-CVE-2018-14618.patch | ||
| 402-CVE-2018-16839.patch | ||
| 403-CVE-2018-16840.patch | ||
| 404-CVE-2018-16842.patch | ||
| 405-CVE-2019-3823.patch | ||
| 406-CVE-2019-3822.patch | ||
| 407-CVE-2018-16890.patch | ||