]> code.ossystems Code Review - openembedded-core.git/commit
wpa-supplicant: fix CVE-2018-14526
authorAndrej Valek <andrej.valek@siemens.com>
Tue, 4 Sep 2018 15:48:06 +0000 (17:48 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 27 Sep 2018 11:16:46 +0000 (12:16 +0100)
commit96f69ae45a47a8aeb17b494b128e034fb12a5e98
tree54f546584b8b7cb15333f73ce894456e5f7f7137
parent4e67fa950cd3ca6e44d7f46743904d23a756e498
wpa-supplicant: fix CVE-2018-14526

Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.

(From OE-Core rev: a5a07887e73ebf0aa6b3b1fa247e44743b39322e)

Signed-off-by: Andrej Valek <andrej.valek@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant-CVE-2018-14526.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.6.bb