* [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
@ 2021-06-01 18:09 Sam Voss
2021-06-01 19:43 ` Arnout Vandecappelle
2021-06-01 20:00 ` Yann E. MORIN
0 siblings, 2 replies; 6+ messages in thread
From: Sam Voss @ 2021-06-01 18:09 UTC (permalink / raw)
To: buildroot
Fixes the following:
- CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in
wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision
discovery requests. It could result in denial of service or other impact
(potentially execution of arbitrary code), for an attacker within radio
range.
Signed-off-by: Sam Voss <sam.voss@collins.com>
---
package/hostapd/hostapd.hash | 1 +
package/hostapd/hostapd.mk | 6 +++++-
2 files changed, 6 insertions(+), 1 deletion(-)
diff --git a/package/hostapd/hostapd.hash b/package/hostapd/hostapd.hash
index e2f76c12d9..9ac5f4b392 100644
--- a/package/hostapd/hostapd.hash
+++ b/package/hostapd/hostapd.hash
@@ -3,4 +3,5 @@ sha256 881d7d6a90b2428479288d64233151448f8990ab4958e0ecaca7eeb3c9db2bd7 hostap
sha256 2d9a5b9d616f1b4aa4a22b967cee866e2f69b798b0b46803a7928c8559842bd7 0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
sha256 49feb35a5276279b465f6836d6fa2c6b34d94dc979e8b840d1918865c04260de 0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
sha256 a8212a2d89a5bab2824d22b6047e7740553df163114fcec94832bfa9c5c5d78a 0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
+sha256 7f40cfec5faf5e927ea9028ab9392cd118685bde7229ad24210caf0a8f6e9611 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
sha256 9da5dd0776da266b180b915e460ff75c6ff729aca1196ab396529510f24f3761 README
diff --git a/package/hostapd/hostapd.mk b/package/hostapd/hostapd.mk
index 8eff92eb1e..8820254f89 100644
--- a/package/hostapd/hostapd.mk
+++ b/package/hostapd/hostapd.mk
@@ -11,7 +11,8 @@ HOSTAPD_CONFIG = $(HOSTAPD_DIR)/$(HOSTAPD_SUBDIR)/.config
HOSTAPD_PATCH = \
https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch \
https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch \
- https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
+ https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \
+ https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
HOSTAPD_DEPENDENCIES = host-pkgconf
HOSTAPD_CFLAGS = $(TARGET_CFLAGS)
HOSTAPD_LICENSE = BSD-3-Clause
@@ -26,6 +27,9 @@ HOSTAPD_IGNORE_CVES += CVE-2020-12695
# 0002-ASN.1-Validate-DigestAlgorithmIdentifier-parameters.patch
HOSTAPD_IGNORE_CVES += CVE-2021-30004
+# 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
+HOSTAPD_IGNORE_CVES += CVE-2021-27803
+
HOSTAPD_CPE_ID_VENDOR = w1.fi
HOSTAPD_CONFIG_SET =
--
2.17.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
2021-06-01 18:09 [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803 Sam Voss
@ 2021-06-01 19:43 ` Arnout Vandecappelle
2021-06-01 20:00 ` Yann E. MORIN
1 sibling, 0 replies; 6+ messages in thread
From: Arnout Vandecappelle @ 2021-06-01 19:43 UTC (permalink / raw)
To: buildroot
On 01/06/2021 20:09, Sam Voss via buildroot wrote:
> Fixes the following:
>
> - CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in
> wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision
> discovery requests. It could result in denial of service or other impact
> (potentially execution of arbitrary code), for an attacker within radio
> range.
>
> Signed-off-by: Sam Voss <sam.voss@collins.com>
Applied to master, thanks.
Regards,
Arnout
> ---
> package/hostapd/hostapd.hash | 1 +
> package/hostapd/hostapd.mk | 6 +++++-
> 2 files changed, 6 insertions(+), 1 deletion(-)
>
> diff --git a/package/hostapd/hostapd.hash b/package/hostapd/hostapd.hash
> index e2f76c12d9..9ac5f4b392 100644
> --- a/package/hostapd/hostapd.hash
> +++ b/package/hostapd/hostapd.hash
> @@ -3,4 +3,5 @@ sha256 881d7d6a90b2428479288d64233151448f8990ab4958e0ecaca7eeb3c9db2bd7 hostap
> sha256 2d9a5b9d616f1b4aa4a22b967cee866e2f69b798b0b46803a7928c8559842bd7 0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
> sha256 49feb35a5276279b465f6836d6fa2c6b34d94dc979e8b840d1918865c04260de 0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
> sha256 a8212a2d89a5bab2824d22b6047e7740553df163114fcec94832bfa9c5c5d78a 0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
> +sha256 7f40cfec5faf5e927ea9028ab9392cd118685bde7229ad24210caf0a8f6e9611 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
> sha256 9da5dd0776da266b180b915e460ff75c6ff729aca1196ab396529510f24f3761 README
> diff --git a/package/hostapd/hostapd.mk b/package/hostapd/hostapd.mk
> index 8eff92eb1e..8820254f89 100644
> --- a/package/hostapd/hostapd.mk
> +++ b/package/hostapd/hostapd.mk
> @@ -11,7 +11,8 @@ HOSTAPD_CONFIG = $(HOSTAPD_DIR)/$(HOSTAPD_SUBDIR)/.config
> HOSTAPD_PATCH = \
> https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch \
> https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch \
> - https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
> + https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \
> + https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
> HOSTAPD_DEPENDENCIES = host-pkgconf
> HOSTAPD_CFLAGS = $(TARGET_CFLAGS)
> HOSTAPD_LICENSE = BSD-3-Clause
> @@ -26,6 +27,9 @@ HOSTAPD_IGNORE_CVES += CVE-2020-12695
> # 0002-ASN.1-Validate-DigestAlgorithmIdentifier-parameters.patch
> HOSTAPD_IGNORE_CVES += CVE-2021-30004
>
> +# 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
> +HOSTAPD_IGNORE_CVES += CVE-2021-27803
> +
> HOSTAPD_CPE_ID_VENDOR = w1.fi
> HOSTAPD_CONFIG_SET =
>
>
^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
2021-06-01 18:09 [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803 Sam Voss
2021-06-01 19:43 ` Arnout Vandecappelle
@ 2021-06-01 20:00 ` Yann E. MORIN
2021-06-01 21:06 ` Arnout Vandecappelle
1 sibling, 1 reply; 6+ messages in thread
From: Yann E. MORIN @ 2021-06-01 20:00 UTC (permalink / raw)
To: buildroot
Sam, All,
On 2021-06-01 13:09 -0500, Sam Voss via buildroot spake thusly:
> Fixes the following:
>
> - CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in
> wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision
> discovery requests. It could result in denial of service or other impact
> (potentially execution of arbitrary code), for an attacker within radio
> range.
Usually, when there is a patch to hostpad to fix a CVE, we probably need
the same patch against wpa_supplicant, since they both shared the same
source tree...
See for example:
0c65499c3f package/wpa_supplicant: fix build with CVE-2021-30004 changes
75496165dc package/hostapd: fix build with CVE-2021-30004 changes
a8fbe67b9b package/wpa_supplicant: add upstream patch to fix CVE-2021-30004
d65586f45a package/hostapd: add upstream patch to fix CVE-2021-30004
2f6a6b8e50 package/wpa_supplicant: ignore CVE-2021-30004 when using openssl
3d3348fd03 package/hostapd: ignore CVE-2021-30004 when using openssl
650d907c13 package/wpa_supplicant: fix CVE-2019-16275
749fbab0bb package/hostapd: fix CVE-2019-16275
Could you look at providing a patch to wpa_supplicant for
CVE-2021-27803, please?
Regards,
Yann E. MORIN.
> Signed-off-by: Sam Voss <sam.voss@collins.com>
> ---
> package/hostapd/hostapd.hash | 1 +
> package/hostapd/hostapd.mk | 6 +++++-
> 2 files changed, 6 insertions(+), 1 deletion(-)
>
> diff --git a/package/hostapd/hostapd.hash b/package/hostapd/hostapd.hash
> index e2f76c12d9..9ac5f4b392 100644
> --- a/package/hostapd/hostapd.hash
> +++ b/package/hostapd/hostapd.hash
> @@ -3,4 +3,5 @@ sha256 881d7d6a90b2428479288d64233151448f8990ab4958e0ecaca7eeb3c9db2bd7 hostap
> sha256 2d9a5b9d616f1b4aa4a22b967cee866e2f69b798b0b46803a7928c8559842bd7 0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
> sha256 49feb35a5276279b465f6836d6fa2c6b34d94dc979e8b840d1918865c04260de 0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
> sha256 a8212a2d89a5bab2824d22b6047e7740553df163114fcec94832bfa9c5c5d78a 0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
> +sha256 7f40cfec5faf5e927ea9028ab9392cd118685bde7229ad24210caf0a8f6e9611 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
> sha256 9da5dd0776da266b180b915e460ff75c6ff729aca1196ab396529510f24f3761 README
> diff --git a/package/hostapd/hostapd.mk b/package/hostapd/hostapd.mk
> index 8eff92eb1e..8820254f89 100644
> --- a/package/hostapd/hostapd.mk
> +++ b/package/hostapd/hostapd.mk
> @@ -11,7 +11,8 @@ HOSTAPD_CONFIG = $(HOSTAPD_DIR)/$(HOSTAPD_SUBDIR)/.config
> HOSTAPD_PATCH = \
> https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch \
> https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch \
> - https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
> + https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \
> + https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
> HOSTAPD_DEPENDENCIES = host-pkgconf
> HOSTAPD_CFLAGS = $(TARGET_CFLAGS)
> HOSTAPD_LICENSE = BSD-3-Clause
> @@ -26,6 +27,9 @@ HOSTAPD_IGNORE_CVES += CVE-2020-12695
> # 0002-ASN.1-Validate-DigestAlgorithmIdentifier-parameters.patch
> HOSTAPD_IGNORE_CVES += CVE-2021-30004
>
> +# 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
> +HOSTAPD_IGNORE_CVES += CVE-2021-27803
> +
> HOSTAPD_CPE_ID_VENDOR = w1.fi
> HOSTAPD_CONFIG_SET =
>
> --
> 2.17.1
>
> _______________________________________________
> buildroot mailing list
> buildroot at busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot
--
.-----------------.--------------------.------------------.--------------------.
| Yann E. MORIN | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: |
| +33 662 376 056 | Software Designer | \ / CAMPAIGN | ___ |
| +33 561 099 427 `------------.-------: X AGAINST | \e/ There is no |
| http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL | v conspiracy. |
'------------------------------^-------^------------------^--------------------'
^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
2021-06-01 20:00 ` Yann E. MORIN
@ 2021-06-01 21:06 ` Arnout Vandecappelle
2021-06-06 7:09 ` Peter Korsgaard
0 siblings, 1 reply; 6+ messages in thread
From: Arnout Vandecappelle @ 2021-06-01 21:06 UTC (permalink / raw)
To: buildroot
On 01/06/2021 22:00, Yann E. MORIN wrote:
> Sam, All,
>
> On 2021-06-01 13:09 -0500, Sam Voss via buildroot spake thusly:
>> Fixes the following:
>>
>> - CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in
>> wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision
>> discovery requests. It could result in denial of service or other impact
>> (potentially execution of arbitrary code), for an attacker within radio
>> range.
>
> Usually, when there is a patch to hostpad to fix a CVE, we probably need
> the same patch against wpa_supplicant, since they both shared the same
> source tree...
>
> See for example:
>
> 0c65499c3f package/wpa_supplicant: fix build with CVE-2021-30004 changes
> 75496165dc package/hostapd: fix build with CVE-2021-30004 changes
> a8fbe67b9b package/wpa_supplicant: add upstream patch to fix CVE-2021-30004
> d65586f45a package/hostapd: add upstream patch to fix CVE-2021-30004
> 2f6a6b8e50 package/wpa_supplicant: ignore CVE-2021-30004 when using openssl
> 3d3348fd03 package/hostapd: ignore CVE-2021-30004 when using openssl
> 650d907c13 package/wpa_supplicant: fix CVE-2019-16275
> 749fbab0bb package/hostapd: fix CVE-2019-16275
>
> Could you look at providing a patch to wpa_supplicant for
> CVE-2021-27803, please?
Peter already applied it in 9ada4eb2f1c3d67ee49f6f5466738bcd821fc647, at the
time there was no CVE yet. Fabrice later added the exception for CVE-2021-27803
in 1a7cf592a834357c5777e452f0b7ab7652e7d389.
So Sam, nothing to do :-)
Regards,
Arnout
>
> Regards,
> Yann E. MORIN.
>
>> Signed-off-by: Sam Voss <sam.voss@collins.com>
>> ---
>> package/hostapd/hostapd.hash | 1 +
>> package/hostapd/hostapd.mk | 6 +++++-
>> 2 files changed, 6 insertions(+), 1 deletion(-)
>>
>> diff --git a/package/hostapd/hostapd.hash b/package/hostapd/hostapd.hash
>> index e2f76c12d9..9ac5f4b392 100644
>> --- a/package/hostapd/hostapd.hash
>> +++ b/package/hostapd/hostapd.hash
>> @@ -3,4 +3,5 @@ sha256 881d7d6a90b2428479288d64233151448f8990ab4958e0ecaca7eeb3c9db2bd7 hostap
>> sha256 2d9a5b9d616f1b4aa4a22b967cee866e2f69b798b0b46803a7928c8559842bd7 0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
>> sha256 49feb35a5276279b465f6836d6fa2c6b34d94dc979e8b840d1918865c04260de 0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
>> sha256 a8212a2d89a5bab2824d22b6047e7740553df163114fcec94832bfa9c5c5d78a 0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
>> +sha256 7f40cfec5faf5e927ea9028ab9392cd118685bde7229ad24210caf0a8f6e9611 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
>> sha256 9da5dd0776da266b180b915e460ff75c6ff729aca1196ab396529510f24f3761 README
>> diff --git a/package/hostapd/hostapd.mk b/package/hostapd/hostapd.mk
>> index 8eff92eb1e..8820254f89 100644
>> --- a/package/hostapd/hostapd.mk
>> +++ b/package/hostapd/hostapd.mk
>> @@ -11,7 +11,8 @@ HOSTAPD_CONFIG = $(HOSTAPD_DIR)/$(HOSTAPD_SUBDIR)/.config
>> HOSTAPD_PATCH = \
>> https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch \
>> https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch \
>> - https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
>> + https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch \
>> + https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
>> HOSTAPD_DEPENDENCIES = host-pkgconf
>> HOSTAPD_CFLAGS = $(TARGET_CFLAGS)
>> HOSTAPD_LICENSE = BSD-3-Clause
>> @@ -26,6 +27,9 @@ HOSTAPD_IGNORE_CVES += CVE-2020-12695
>> # 0002-ASN.1-Validate-DigestAlgorithmIdentifier-parameters.patch
>> HOSTAPD_IGNORE_CVES += CVE-2021-30004
>>
>> +# 0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
>> +HOSTAPD_IGNORE_CVES += CVE-2021-27803
>> +
>> HOSTAPD_CPE_ID_VENDOR = w1.fi
>> HOSTAPD_CONFIG_SET =
>>
>> --
>> 2.17.1
>>
>> _______________________________________________
>> buildroot mailing list
>> buildroot at busybox.net
>> http://lists.busybox.net/mailman/listinfo/buildroot
>
^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
2021-06-01 21:06 ` Arnout Vandecappelle
@ 2021-06-06 7:09 ` Peter Korsgaard
2021-06-10 20:14 ` [Buildroot] [External] " Voss, Samuel M Collins
0 siblings, 1 reply; 6+ messages in thread
From: Peter Korsgaard @ 2021-06-06 7:09 UTC (permalink / raw)
To: buildroot
>>>>> "Arnout" == Arnout Vandecappelle <arnout@mind.be> writes:
Hi,
>> Could you look at providing a patch to wpa_supplicant for
>> CVE-2021-27803, please?
> Peter already applied it in 9ada4eb2f1c3d67ee49f6f5466738bcd821fc647, at the
> time there was no CVE yet. Fabrice later added the exception for CVE-2021-27803
> in 1a7cf592a834357c5777e452f0b7ab7652e7d389.
Indeed. I did not add it to hostapd at the time, as the issue (to my
reading at least) is specific to wpa_supplicant.
Why are we adding it to hostapd here? Just for consistency?
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [External] Re: [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
2021-06-06 7:09 ` Peter Korsgaard
@ 2021-06-10 20:14 ` Voss, Samuel M Collins
0 siblings, 0 replies; 6+ messages in thread
From: Voss, Samuel M Collins @ 2021-06-10 20:14 UTC (permalink / raw)
To: buildroot
Hi Peter,
>-----Original Message-----
>From: Peter Korsgaard <jacmet@gmail.com> On Behalf Of Peter Korsgaard
>Sent: Sunday, June 06, 2021 2:10 AM
>To: Arnout Vandecappelle <arnout@mind.be>
>Cc: Yann E. MORIN <yann.morin.1998@free.fr>; Voss, Samuel M Collins <sam.voss@collins.com>; Weber, Matthew L Collins <Matthew.Weber@collins.com>; Sergey Matyukevich <geomatsi@gmail.com>; buildroot at buildroot.org
>Subject: [External] Re: [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803
>
>>>>>> "Arnout" == Arnout Vandecappelle <arnout@mind.be> writes:
>
>Hi,
>
> >> Could you look at providing a patch to wpa_supplicant for >> CVE-2021-27803, please?
>
> > Peter already applied it in 9ada4eb2f1c3d67ee49f6f5466738bcd821fc647, at the > time there was no CVE yet. Fabrice later added the exception for CVE-2021-27803 > in 1a7cf592a834357c5777e452f0b7ab7652e7d389.
>
>Indeed. I did not add it to hostapd at the time, as the issue (to my reading at least) is specific to wpa_supplicant.
>
>Why are we adding it to hostapd here? Just for consistency?
Ultimately it was added because it was identified as a CVE against this version of the package, and a patch was available for it. It came up during CVE discovery on one of our products so I sent the patch accordingly.
I didn't personally take the onus to establish whether it was exploitable, just that it was reported as vulnerable.
Sam
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2021-06-10 20:14 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-06-01 18:09 [Buildroot] [PATCH] package/hostapd: add upstream patch to fix CVE-2021-27803 Sam Voss
2021-06-01 19:43 ` Arnout Vandecappelle
2021-06-01 20:00 ` Yann E. MORIN
2021-06-01 21:06 ` Arnout Vandecappelle
2021-06-06 7:09 ` Peter Korsgaard
2021-06-10 20:14 ` [Buildroot] [External] " Voss, Samuel M Collins
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.