]> code.ossystems Code Review - openembedded-core.git/commit
wpa-supplicant: fix CVE-2018-14526
authorAndrej Valek <andrej.valek@siemens.com>
Tue, 4 Sep 2018 15:48:06 +0000 (17:48 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 5 Sep 2018 17:00:00 +0000 (18:00 +0100)
commita5a07887e73ebf0aa6b3b1fa247e44743b39322e
tree9608e1214dda5289c2972e79556371f853b9b51e
parentefa34c4c82e9e334d1f102b7729bed5f1500e6ae
wpa-supplicant: fix CVE-2018-14526

Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.

Signed-off-by: Andrej Valek <andrej.valek@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant-CVE-2018-14526.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.6.bb