summaryrefslogtreecommitdiffstats
path: root/gps/gps.conf_AS_SUPL
diff options
context:
space:
mode:
authorWanja Schulze <rajaschu@googlemail.com>2018-04-04 00:46:44 +0200
committerAndreas Blaesius <andi@unlegacy-android.org>2018-04-14 19:07:07 +0200
commit9d6f5164547add1ed7e2f11826362be11f7bc0e4 (patch)
treeecd715cba4ee45ade60a90b5104512285cc74b0d /gps/gps.conf_AS_SUPL
parente0e0d5b4b4e81fafd4bc1c96744b367ce3e73f6e (diff)
downloadandroid_device_common-cm-13.0.tar.gz
android_device_common-cm-13.0.tar.bz2
android_device_common-cm-13.0.zip
Because the XTRA and XTRA2 data files are served over HTTP without SSL, this allows an attacker to mount a MITM attack on the network level and modify the GPS assistance data while in transit. Informations and fix taken from: https://wwws.nightwatchcybersecurity.com/2016/12/05/cve-2016-5341/ Change-Id: I4b2c16acc7316c56d6d50d824bf951b248df16e0 (cherry picked from commit cf37f0af1e3daf34771fc051d9d6d60122e8e7a8)
Diffstat (limited to 'gps/gps.conf_AS_SUPL')
-rw-r--r--gps/gps.conf_AS_SUPL6
1 files changed, 3 insertions, 3 deletions
diff --git a/gps/gps.conf_AS_SUPL b/gps/gps.conf_AS_SUPL
index a0e2a7d..ddd2be3 100644
--- a/gps/gps.conf_AS_SUPL
+++ b/gps/gps.conf_AS_SUPL
@@ -1,5 +1,5 @@
-XTRA_SERVER_1=http://xtra1.gpsonextra.net/xtra.bin
-XTRA_SERVER_2=http://xtra2.gpsonextra.net/xtra.bin
-XTRA_SERVER_3=http://xtra3.gpsonextra.net/xtra.bin
+XTRA_SERVER_1=https://xtrapath1.izatcloud.net/xtra.bin
+XTRA_SERVER_2=https://xtrapath2.izatcloud.net/xtra.bin
+XTRA_SERVER_3=https://xtrapath3.izatcloud.net/xtra.bin
SUPL_HOST=supl.google.com
SUPL_PORT=7276