diff options
author | Baruch Siach <baruch@tkos.co.il> | 2014-05-21 12:54:00 +0300 |
---|---|---|
committer | Peter Korsgaard <peter@korsgaard.com> | 2014-05-21 13:02:02 +0200 |
commit | 39d1717efd390688da4b7a11af71ef63e09a3d42 (patch) | |
tree | eb64f5c2638f37242b9d04db186201ccca7947df /package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch | |
parent | 9725c5aefc5861e7eb9736f9228265a5d1a7e998 (diff) | |
download | buildroot-39d1717efd390688da4b7a11af71ef63e09a3d42.tar.gz buildroot-39d1717efd390688da4b7a11af71ef63e09a3d42.zip |
wpa_supplicant: fix internal TLS implementation security issues
Add upstream patches fixing internal TLS validation of X.509 certificates. See
http://lists.shmoo.com/pipermail/hostap/2014-May/030273.html for details.
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch')
-rw-r--r-- | package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch b/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch new file mode 100644 index 0000000000..7862de7a64 --- /dev/null +++ b/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch @@ -0,0 +1,35 @@ +From 6c5be116dd6997f68e524247751cff53c74519d7 Mon Sep 17 00:00:00 2001 +From: Jouni Malinen <jouni@qca.qualcomm.com> +Date: Mon, 19 May 2014 23:26:43 +0300 +Subject: [PATCH] PKCS #1: Enforce minimum padding for decryption in + internal TLS + +Follow the PKCS #1 v1.5, 8.1 constraint of at least eight octets long PS +for the case where the internal TLS implementation decrypts PKCS #1 +formatted data. Similar limit was already in place for signature +validation, but not for this decryption routine. + +Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> +--- + src/tls/pkcs1.c | 5 +++++ + 1 file changed, 5 insertions(+) + +diff --git a/src/tls/pkcs1.c b/src/tls/pkcs1.c +index af58a42987c6..ea3e6171a1d1 100644 +--- a/src/tls/pkcs1.c ++++ b/src/tls/pkcs1.c +@@ -113,6 +113,11 @@ int pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, + pos++; + if (pos == end) + return -1; ++ if (pos - out - 2 < 8) { ++ /* PKCS #1 v1.5, 8.1: At least eight octets long PS */ ++ wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); ++ return -1; ++ } + pos++; + + *outlen -= pos - out; +-- +2.0.0.rc2 + |