]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
wpa-supplicant: Fix CVE-2023-52160
authorClaus Stovgaard <claus.stovgaard@gmail.com>
Tue, 27 Feb 2024 17:45:50 +0000 (18:45 +0100)
committerSteve Sakoman <steve@sakoman.com>
Fri, 15 Mar 2024 15:07:18 +0000 (05:07 -1000)
commit7d0e3f31d2193b2b13a9fe3f368a172f4eaa7c48
treee798e9a5ff1a0b694a7f1da4ab1973b1b446c4f2
parentc1b3c3856c2bdf2d9d6dfbaccfce549396a8630a
wpa-supplicant: Fix CVE-2023-52160

PEAP client: Update Phase 2 authentication requirements. Also see
https://www.top10vpn.com/research/wifi-vulnerabilities/

Signed-off-by: Claus Stovgaard <claus.stovgaard@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 57b6a329df897de69ae8b90706d9fe37e0ed6d35)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-PEAP-client-Update-Phase-2-authentication-requiremen.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb