diff options
author | Stefan Ghinea <stefan.ghinea@windriver.com> | 2021-04-08 19:43:30 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-04-18 11:37:25 +0100 |
commit | f07d4c22349f292a1f7f052e847253f7011e2f1e (patch) | |
tree | 3cb638026e2204ceb3b18a1d11bb2d060f24aebd /scripts/send-error-report | |
parent | 317907d736696dc597f7f4cb534471f0f8168c8b (diff) | |
download | poky-f07d4c22349f292a1f7f052e847253f7011e2f1e.tar.gz |
wpa-supplicant: fix CVE-2021-30004
In wpa_supplicant and hostapd 2.9, forging attacks may occur because
AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and
tls/x509v3.c.
References:
https://nvd.nist.gov/vuln/detail/CVE-2021-30004
Upstream patches:
https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15
(From OE-Core rev: b32b671bf430b36a5547f8d822dbb760d6be47f7)
Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/send-error-report')
0 files changed, 0 insertions, 0 deletions