]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
wpa-supplicant: Patch CVE-2024-3596
authorPeter Marko <peter.marko@siemens.com>
Sun, 29 Sep 2024 12:57:09 +0000 (14:57 +0200)
committerSteve Sakoman <steve@sakoman.com>
Mon, 30 Sep 2024 13:10:50 +0000 (06:10 -0700)
commit6f65fd4d98b5a5dcd410b2dcfeb2e6f229c3b973
treeffb85d120da929880b1dfcae8c75a72e4cd2cd04
parent603047ab3c85009c384793cdbdd8e6ae1aebd737
wpa-supplicant: Patch CVE-2024-3596

Picked patches according to
http://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt

First patch is style commit picked to have a clean cherry-pick of all
mentioned commits without any conflict.
Patch CVE-2024-3596_07.patch has hostapd code removed as it is not
present in wpa-supplicant download tarball.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_00.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_01.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_02.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_03.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_04.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_05.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_06.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_07.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_08.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb