summaryrefslogtreecommitdiffstats
path: root/meta/recipes-kernel
diff options
context:
space:
mode:
authorStefan Ghinea <stefan.ghinea@windriver.com>2021-04-08 19:43:30 +0300
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-04-30 14:37:25 +0100
commit855a1596f5a0dcba39277c210a7e61c6604bfb85 (patch)
tree1ef5b55e3ecaf4e6be97903db651702a96252118 /meta/recipes-kernel
parenta2bf564b5fa4670003465ac011a04d84549a089b (diff)
downloadpoky-855a1596f5a0dcba39277c210a7e61c6604bfb85.tar.gz
wpa-supplicant: fix CVE-2021-30004
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. References: https://nvd.nist.gov/vuln/detail/CVE-2021-30004 Upstream patches: https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15 (From OE-Core rev: decf95ad84a38b86e4e9f86a78f76535f4f22d4f) Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit b32b671bf430b36a5547f8d822dbb760d6be47f7) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-kernel')
0 files changed, 0 insertions, 0 deletions