mirror of
https://git.openwrt.org/openwrt/openwrt.git
synced 2026-03-14 23:09:45 +01:00
- WPS: Fix HTTP chunked transfer encoding parser (CVE-2015-4141) - EAP-pwd peer: Fix payload length validation for Commit and Confirm (CVE-2015-4143) - EAP-pwd server: Fix payload length validation for Commit and Confirm (CVE-2015-4143) - EAP-pwd peer: Fix Total-Length parsing for fragment reassembly (CVE-2015-4144, CVE-2015-4145) - EAP-pwd server: Fix Total-Length parsing for fragment reassembly (CVE-2015-4144, CVE-2015-4145) - EAP-pwd peer: Fix asymmetric fragmentation behavior (CVE-2015-4146) - NFC: Fix payload length validation in NDEF record parser (CVE-2015-8041) - WNM: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in use (CVE-2015-5310) - EAP-pwd peer: Fix last fragment length validation (CVE-2015-5315) - EAP-pwd server: Fix last fragment length validation (CVE-2015-5314) - EAP-pwd peer: Fix error path for unexpected Confirm message (CVE-2015-5316) Signed-off-by: Stefan Lippers-Hollmann <s.l-h@gmx.de> SVN-Revision: 48185 |
||
|---|---|---|
| .. | ||
| 001-P2P-Validate-SSID-element-length-before-copying-it-C.patch | ||
| 002-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch | ||
| 003-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch | ||
| 004-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch | ||
| 005-EAP-pwd-server-Fix-payload-length-validation-for-Com.patch | ||
| 006-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch | ||
| 007-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch | ||
| 008-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch | ||
| 009-NFC-Fix-payload-length-validation-in-NDEF-record-par.patch | ||
| 010-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch | ||
| 011-EAP-pwd-peer-Fix-last-fragment-length-validation.patch | ||
| 012-EAP-pwd-server-Fix-last-fragment-length-validation.patch | ||
| 013-EAP-pwd-peer-Fix-error-path-for-unexpected-Confirm-m.patch | ||
| 110-bool_fix.patch | ||
| 120-daemonize_fix.patch | ||
| 130-no_eapol_fix.patch | ||
| 140-disable_bridge_packet_workaround.patch | ||
| 200-multicall.patch | ||
| 300-noscan.patch | ||
| 310-rescan_immediately.patch | ||
| 320-optional_rfkill.patch | ||
| 330-nl80211_fix_set_freq.patch | ||
| 340-reload_freq_change.patch | ||
| 350-nl80211_del_beacon_bss.patch | ||
| 360-ctrl_iface_reload.patch | ||
| 370-ap_sta_support.patch | ||
| 380-disable_ctrl_iface_mib.patch | ||
| 390-wpa_ie_cap_workaround.patch | ||
| 400-wps_single_auth_enc_type.patch | ||
| 410-limit_debug_messages.patch | ||
| 420-indicate-features.patch | ||
| 430-hostapd_cli_ifdef.patch | ||
| 431-wpa_cli_ifdef.patch | ||
| 440-max_num_sta_probe.patch | ||
| 450-scan_wait.patch | ||
| 460-wpa_supplicant-add-new-config-params-to-be-used-with.patch | ||
| 461-driver_nl80211-use-new-parameters-during-ibss-join.patch | ||
| 462-wpa_s-support-htmode-param.patch | ||
| 470-wait-for-nullfunc-longer.patch | ||
| 600-ubus_support.patch | ||