diff options
| -rw-r--r-- | meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2021-27803.patch | 54 | ||||
| -rw-r--r-- | meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb | 1 |
2 files changed, 55 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2021-27803.patch b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2021-27803.patch new file mode 100644 index 0000000000..dc576d1a11 --- /dev/null +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2021-27803.patch | |||
| @@ -0,0 +1,54 @@ | |||
| 1 | From 8460e3230988ef2ec13ce6b69b687e941f6cdb32 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Jouni Malinen <jouni@codeaurora.org> | ||
| 3 | Date: Tue, 8 Dec 2020 23:52:50 +0200 | ||
| 4 | Subject: [PATCH] P2P: Fix a corner case in peer addition based on PD Request | ||
| 5 | |||
| 6 | p2p_add_device() may remove the oldest entry if there is no room in the | ||
| 7 | peer table for a new peer. This would result in any pointer to that | ||
| 8 | removed entry becoming stale. A corner case with an invalid PD Request | ||
| 9 | frame could result in such a case ending up using (read+write) freed | ||
| 10 | memory. This could only by triggered when the peer table has reached its | ||
| 11 | maximum size and the PD Request frame is received from the P2P Device | ||
| 12 | Address of the oldest remaining entry and the frame has incorrect P2P | ||
| 13 | Device Address in the payload. | ||
| 14 | |||
| 15 | Fix this by fetching the dev pointer again after having called | ||
| 16 | p2p_add_device() so that the stale pointer cannot be used. | ||
| 17 | |||
| 18 | Fixes: 17bef1e97a50 ("P2P: Add peer entry based on Provision Discovery Request") | ||
| 19 | Signed-off-by: Jouni Malinen <jouni@codeaurora.org> | ||
| 20 | |||
| 21 | Upstream-Status: Acepted [https://w1.fi/cgit/hostap/commit/?id=8460e3230988ef2ec13ce6b69b687e941f6cdb32] | ||
| 22 | CVE: CVE-2021-27803 | ||
| 23 | Signed-off-by: Minjae Kim <flowergom@gmail.com> | ||
| 24 | --- | ||
| 25 | src/p2p/p2p_pd.c | 12 +++++------- | ||
| 26 | 1 file changed, 5 insertions(+), 7 deletions(-) | ||
| 27 | |||
| 28 | diff --git a/src/p2p/p2p_pd.c b/src/p2p/p2p_pd.c | ||
| 29 | index 3994ec03f86b..05fd593494ef 100644 | ||
| 30 | --- a/src/p2p/p2p_pd.c | ||
| 31 | +++ b/src/p2p/p2p_pd.c | ||
| 32 | @@ -595,14 +595,12 @@ void p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa, | ||
| 33 | goto out; | ||
| 34 | } | ||
| 35 | |||
| 36 | + dev = p2p_get_device(p2p, sa); | ||
| 37 | if (!dev) { | ||
| 38 | - dev = p2p_get_device(p2p, sa); | ||
| 39 | - if (!dev) { | ||
| 40 | - p2p_dbg(p2p, | ||
| 41 | - "Provision Discovery device not found " | ||
| 42 | - MACSTR, MAC2STR(sa)); | ||
| 43 | - goto out; | ||
| 44 | - } | ||
| 45 | + p2p_dbg(p2p, | ||
| 46 | + "Provision Discovery device not found " | ||
| 47 | + MACSTR, MAC2STR(sa)); | ||
| 48 | + goto out; | ||
| 49 | } | ||
| 50 | } else if (msg.wfd_subelems) { | ||
| 51 | wpabuf_free(dev->info.wfd_subelems); | ||
| 52 | -- | ||
| 53 | 2.25.1 | ||
| 54 | |||
diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb index caa6018ce8..357c28634a 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb | |||
| @@ -31,6 +31,7 @@ SRC_URI = "http://w1.fi/releases/wpa_supplicant-${PV}.tar.gz \ | |||
| 31 | file://0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch \ | 31 | file://0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch \ |
| 32 | file://0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \ | 32 | file://0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \ |
| 33 | file://CVE-2021-0326.patch \ | 33 | file://CVE-2021-0326.patch \ |
| 34 | file://CVE-2021-27803.patch \ | ||
| 34 | " | 35 | " |
| 35 | SRC_URI[md5sum] = "2d2958c782576dc9901092fbfecb4190" | 36 | SRC_URI[md5sum] = "2d2958c782576dc9901092fbfecb4190" |
| 36 | SRC_URI[sha256sum] = "fcbdee7b4a64bea8177973299c8c824419c413ec2e3a95db63dd6a5dc3541f17" | 37 | SRC_URI[sha256sum] = "fcbdee7b4a64bea8177973299c8c824419c413ec2e3a95db63dd6a5dc3541f17" |
