summary refs log tree commit diff
path: root/gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch
diff options
context:
space:
mode:
authorMark H Weaver <mhw@netris.org>2015-10-08 08:42:13 -0400
committerMark H Weaver <mhw@netris.org>2015-10-08 09:15:30 -0400
commite91e28d60c66362b7114d7a3ed7809609f2c1b4b (patch)
tree38800abdc57a795673d6b71385703f2ac8421b26 /gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch
parent797e1401feda5c32c67c2069afdbdc29792dfa78 (diff)
downloadguix-e91e28d60c66362b7114d7a3ed7809609f2c1b4b.tar.gz
gnu: wpa-supplicant: Update to 2.5.
* gnu/packages/patches/wpa-supplicant-2015-2-fix.patch,
  gnu/packages/patches/wpa-supplicant-2015-3-fix.patch,
  gnu/packages/patches/wpa-supplicant-2015-4-fix-pt1.patch,
  gnu/packages/patches/wpa-supplicant-2015-4-fix-pt2.patch,
  gnu/packages/patches/wpa-supplicant-2015-4-fix-pt3.patch,
  gnu/packages/patches/wpa-supplicant-2015-4-fix-pt4.patch,
  gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch,
  gnu/packages/patches/wpa-supplicant-2015-5-fix.patch,
  gnu/packages/patches/wpa-supplicant-CVE-2015-1863.patch: Delete files.
* gnu-system.am (dist_patch_DATA): Remove them.
* gnu/packages/admin.scm (wpa-supplicant-minimal): Update to 2.5.
  Remove patches.
Diffstat (limited to 'gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch')
-rw-r--r--gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch34
1 files changed, 0 insertions, 34 deletions
diff --git a/gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch b/gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch
deleted file mode 100644
index 30f71974ad..0000000000
--- a/gnu/packages/patches/wpa-supplicant-2015-4-fix-pt5.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-Patch copied from http://w1.fi/security/2015-4/
-
-From 28a069a545b06b99eb55ad53f63f2c99e65a98f6 Mon Sep 17 00:00:00 2001
-From: Jouni Malinen <j@w1.fi>
-Date: Sat, 2 May 2015 19:26:28 +0300
-Subject: [PATCH 5/5] EAP-pwd peer: Fix asymmetric fragmentation behavior
-
-The L (Length) and M (More) flags needs to be cleared before deciding
-whether the locally generated response requires fragmentation. This
-fixes an issue where these flags from the server could have been invalid
-for the following message. In some cases, this could have resulted in
-triggering the wpabuf security check that would terminate the process
-due to invalid buffer allocation.
-
-Signed-off-by: Jouni Malinen <j@w1.fi>
----
- src/eap_peer/eap_pwd.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/src/eap_peer/eap_pwd.c b/src/eap_peer/eap_pwd.c
-index 1d2079b..e58b13a 100644
---- a/src/eap_peer/eap_pwd.c
-+++ b/src/eap_peer/eap_pwd.c
-@@ -968,6 +968,7 @@ eap_pwd_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret,
- 	/*
- 	 * we have output! Do we need to fragment it?
- 	 */
-+	lm_exch = EAP_PWD_GET_EXCHANGE(lm_exch);
- 	len = wpabuf_len(data->outbuf);
- 	if ((len + EAP_PWD_HDR_SIZE) > data->mtu) {
- 		resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, data->mtu,
--- 
-1.9.1
-