package/iwd: security bump to version 2.16
Fix CVE-2023-52161: The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key. https://git.kernel.org/pub/scm/network/wireless/iwd.git/tree/ChangeLog?h=2.16 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
2695f48ead
commit
e2bcdcdd10
@ -1,5 +1,5 @@
|
||||
# From https://mirrors.edge.kernel.org/pub/linux/network/wireless/sha256sums.asc
|
||||
sha256 f7ac93aeef672604f5b5194ca038035ae222925be392c4345873c9742f477797 iwd-2.6.tar.xz
|
||||
sha256 c1a82032e994861e794cf3b5a16d07ae1aa03a6674f716c73408ffeae2a233ba iwd-2.16.tar.xz
|
||||
|
||||
# License files
|
||||
sha256 ec60b993835e2c6b79e6d9226345f4e614e686eb57dc13b6420c15a33a8996e5 COPYING
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
IWD_VERSION = 2.6
|
||||
IWD_VERSION = 2.16
|
||||
IWD_SOURCE = iwd-$(IWD_VERSION).tar.xz
|
||||
IWD_SITE = $(BR2_KERNEL_MIRROR)/linux/network/wireless
|
||||
IWD_LICENSE = LGPL-2.1+
|
||||
|
Loading…
Reference in New Issue
Block a user