package/wpa_supplicant: ignore CVE-2021-30004 when using openssl
authorMatt Weber <matthew.weber@rockwellcollins.com>
Wed, 21 Apr 2021 20:42:32 +0000 (15:42 -0500)
committerYann E. MORIN <yann.morin.1998@free.fr>
Sat, 24 Apr 2021 09:28:03 +0000 (11:28 +0200)
The CVE can be ignored when the internal TLS impl isn't used.

https://security-tracker.debian.org/tracker/CVE-2021-30004
 "Issue only affects the "internal" TLS implementation
 (CONFIG_TLS=internal)"

Signed-off-by: Matthew Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
package/wpa_supplicant/wpa_supplicant.mk

index 356ea918288c01ca142b65117298a0904c9f7a0c..f59832645fce71879211b544d0f574f11e88c7fa 100644 (file)
@@ -132,6 +132,8 @@ ifeq ($(BR2_PACKAGE_LIBOPENSSL),y)
 WPA_SUPPLICANT_DEPENDENCIES += host-pkgconf libopenssl
 WPA_SUPPLICANT_LIBS += `$(PKG_CONFIG_HOST_BINARY) --libs openssl`
 WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=openssl\)/\1/'
+# Issue only affects the "internal" TLS implementation
+WPA_SUPPLICANT_IGNORE_CVES += CVE-2021-30004
 else
 WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD CONFIG_EAP_TEAP
 WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=\).*/\1internal/'