diff options
author | Stefan Ghinea <stefan.ghinea@windriver.com> | 2021-04-08 19:43:30 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-04-23 10:41:21 +0100 |
commit | 207c859da924844cd5d1b8d35a8cf0cda3fc680e (patch) | |
tree | a97c5172064018f8218cf2b1fc83450573d2f76f /meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb | |
parent | 94a83886ed5329b508794a625509e1798cd00612 (diff) | |
download | poky-207c859da924844cd5d1b8d35a8cf0cda3fc680e.tar.gz |
wpa-supplicant: fix CVE-2021-30004
In wpa_supplicant and hostapd 2.9, forging attacks may occur because
AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and
tls/x509v3.c.
References:
https://nvd.nist.gov/vuln/detail/CVE-2021-30004
Upstream patches:
https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15
(From OE-Core rev: 30cf99e92f4ccaa13a685c987b3b77aeb966d7f7)
Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit b32b671bf430b36a5547f8d822dbb760d6be47f7)
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb')
-rw-r--r-- | meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb index 0f2b7407e9..915b326b81 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb | |||
@@ -31,6 +31,7 @@ SRC_URI = "http://w1.fi/releases/wpa_supplicant-${PV}.tar.gz \ | |||
31 | file://0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \ | 31 | file://0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \ |
32 | file://CVE-2021-0326.patch \ | 32 | file://CVE-2021-0326.patch \ |
33 | file://CVE-2021-27803.patch \ | 33 | file://CVE-2021-27803.patch \ |
34 | file://CVE-2021-30004.patch \ | ||
34 | " | 35 | " |
35 | SRC_URI[md5sum] = "2d2958c782576dc9901092fbfecb4190" | 36 | SRC_URI[md5sum] = "2d2958c782576dc9901092fbfecb4190" |
36 | SRC_URI[sha256sum] = "fcbdee7b4a64bea8177973299c8c824419c413ec2e3a95db63dd6a5dc3541f17" | 37 | SRC_URI[sha256sum] = "fcbdee7b4a64bea8177973299c8c824419c413ec2e3a95db63dd6a5dc3541f17" |