diff options
author | Wanja Schulze <rajaschu@googlemail.com> | 2018-04-04 00:46:44 +0200 |
---|---|---|
committer | Andreas Blaesius <andi@unlegacy-android.org> | 2018-04-14 19:07:07 +0200 |
commit | 9d6f5164547add1ed7e2f11826362be11f7bc0e4 (patch) | |
tree | ecd715cba4ee45ade60a90b5104512285cc74b0d /generate-blob-lists.sh | |
parent | e0e0d5b4b4e81fafd4bc1c96744b367ce3e73f6e (diff) | |
download | android_device_common-cm-13.0.tar.gz android_device_common-cm-13.0.tar.bz2 android_device_common-cm-13.0.zip |
Switch to a secure gps connectionHEADreplicant-6.0-0004-transitionreplicant-6.0-0004-rc6replicant-6.0-0004-rc5-transitionreplicant-6.0-0004-rc5replicant-6.0-0004-rc4replicant-6.0-0004-rc3replicant-6.0-0004-rc2replicant-6.0-0004-rc1replicant-6.0-0004cm-13.0
Because the XTRA and XTRA2 data files are served over HTTP without SSL,
this allows an attacker to mount a MITM attack on the network level and
modify the GPS assistance data while in transit.
Informations and fix taken from:
https://wwws.nightwatchcybersecurity.com/2016/12/05/cve-2016-5341/
Change-Id: I4b2c16acc7316c56d6d50d824bf951b248df16e0
(cherry picked from commit cf37f0af1e3daf34771fc051d9d6d60122e8e7a8)
Diffstat (limited to 'generate-blob-lists.sh')
0 files changed, 0 insertions, 0 deletions