diff options
author | Petr Štetiar <ynezz@true.cz> | 2020-06-08 17:35:32 +0200 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2020-06-09 16:59:33 +0200 |
commit | df6a33a8d4115fcb7edd048f7dbfea054e9477b4 (patch) | |
tree | efbe623806ba2c24f7e021f40bde7ca659d25c70 /package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch | |
parent | 22468cc40c8b6ff5ff020b3c6468e07cbd5bb722 (diff) | |
download | upstream-df6a33a8d4115fcb7edd048f7dbfea054e9477b4.tar.gz upstream-df6a33a8d4115fcb7edd048f7dbfea054e9477b4.tar.bz2 upstream-df6a33a8d4115fcb7edd048f7dbfea054e9477b4.zip |
hostapd: update to latest Git hostap_2_9-1331-g5a8b366233f5
Bump to latest Git and refresh all patches in order to get fix for "UPnP
SUBSCRIBE misbehavior in hostapd WPS AP" (CVE-2020-12695).
General security vulnerability in the way the callback URLs in the UPnP
SUBSCRIBE command are used were reported (VU#339275, CVE-2020-12695).
Some of the described issues may be applicable to the use of UPnP in WPS
AP mode functionality for supporting external registrars.
Ref: https://w1.fi/security/2020-1/
Signed-off-by: Petr Štetiar <ynezz@true.cz>
Diffstat (limited to 'package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch')
-rw-r--r-- | package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch b/package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch index 1318759ea7..9dee2d738e 100644 --- a/package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch +++ b/package/network/services/hostapd/patches/390-wpa_ie_cap_workaround.patch @@ -1,6 +1,6 @@ --- a/src/common/wpa_common.c +++ b/src/common/wpa_common.c -@@ -2119,6 +2119,31 @@ u32 wpa_akm_to_suite(int akm) +@@ -2121,6 +2121,31 @@ u32 wpa_akm_to_suite(int akm) } @@ -32,7 +32,7 @@ int wpa_compare_rsn_ie(int ft_initial_assoc, const u8 *ie1, size_t ie1len, const u8 *ie2, size_t ie2len) -@@ -2126,8 +2151,19 @@ int wpa_compare_rsn_ie(int ft_initial_as +@@ -2128,8 +2153,19 @@ int wpa_compare_rsn_ie(int ft_initial_as if (ie1 == NULL || ie2 == NULL) return -1; |