]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
wpa-supplicant: patch CVE-2025-24912
authorPeter Marko <peter.marko@siemens.com>
Sat, 1 Nov 2025 21:04:21 +0000 (22:04 +0100)
committerSteve Sakoman <steve@sakoman.com>
Mon, 3 Nov 2025 15:44:03 +0000 (07:44 -0800)
commita157719ab349d9393d5a640bb2e45fc2489d5338
tree7407f5b98db72fbfe0ae64f8e6ffb5acda710d10
parent4cb834388759540ea5bf7265389b9f1b2e15333a
wpa-supplicant: patch CVE-2025-24912

Pick patches as listed in NVD CVE report.

Note that Debian lists one of the patches as introducing the
vulnerability. This is against what the original report [1] says.
Also the commit messages provide hints that the first patch fixes this
issue and second is fixing problem with the first patch.

[1] https://jvn.jp/en/jp/JVN19358384/

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-01.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-02.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb