mirror of
https://git.yoctoproject.org/git/poky
synced 2026-01-01 13:58:04 +00:00
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. References: https://nvd.nist.gov/vuln/detail/CVE-2021-30004 Upstream patches: https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15 (From OE-Core rev: 30cf99e92f4ccaa13a685c987b3b77aeb966d7f7) Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit b32b671bf430b36a5547f8d822dbb760d6be47f7) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> |
||
|---|---|---|
| .. | ||
| avahi | ||
| bind | ||
| bluez5 | ||
| connman | ||
| dhcpcd | ||
| inetutils | ||
| iproute2 | ||
| iw | ||
| kea | ||
| libnss-mdns | ||
| libpcap | ||
| libuv | ||
| mobile-broadband-provider-info | ||
| neard | ||
| nfs-utils | ||
| ofono | ||
| openssh | ||
| openssl | ||
| ppp | ||
| ppp-dialin | ||
| resolvconf | ||
| socat | ||
| ssh-pregen-hostkeys | ||
| wpa-supplicant | ||