aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch
diff options
context:
space:
mode:
authorPetr Štetiar <ynezz@true.cz>2020-06-08 17:35:32 +0200
committerPetr Štetiar <ynezz@true.cz>2020-06-09 16:59:33 +0200
commitdf6a33a8d4115fcb7edd048f7dbfea054e9477b4 (patch)
treeefbe623806ba2c24f7e021f40bde7ca659d25c70 /package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch
parent22468cc40c8b6ff5ff020b3c6468e07cbd5bb722 (diff)
downloadupstream-df6a33a8d4115fcb7edd048f7dbfea054e9477b4.tar.gz
upstream-df6a33a8d4115fcb7edd048f7dbfea054e9477b4.tar.bz2
upstream-df6a33a8d4115fcb7edd048f7dbfea054e9477b4.zip
hostapd: update to latest Git hostap_2_9-1331-g5a8b366233f5
Bump to latest Git and refresh all patches in order to get fix for "UPnP SUBSCRIBE misbehavior in hostapd WPS AP" (CVE-2020-12695). General security vulnerability in the way the callback URLs in the UPnP SUBSCRIBE command are used were reported (VU#339275, CVE-2020-12695). Some of the described issues may be applicable to the use of UPnP in WPS AP mode functionality for supporting external registrars. Ref: https://w1.fi/security/2020-1/ Signed-off-by: Petr Štetiar <ynezz@true.cz>
Diffstat (limited to 'package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch')
-rw-r--r--package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch10
1 files changed, 5 insertions, 5 deletions
diff --git a/package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch b/package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch
index 876becfbc9..a2a03c04f7 100644
--- a/package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch
+++ b/package/network/services/hostapd/patches/350-nl80211_del_beacon_bss.patch
@@ -1,6 +1,6 @@
--- a/src/drivers/driver_nl80211.c
+++ b/src/drivers/driver_nl80211.c
-@@ -2787,10 +2787,15 @@ static int wpa_driver_nl80211_del_beacon
+@@ -2788,10 +2788,15 @@ static int wpa_driver_nl80211_del_beacon
struct nl_msg *msg;
struct wpa_driver_nl80211_data *drv = bss->drv;
@@ -18,7 +18,7 @@
return send_and_recv_msgs(drv, msg, NULL, NULL);
}
-@@ -5260,7 +5265,7 @@ static void nl80211_teardown_ap(struct i
+@@ -5261,7 +5266,7 @@ static void nl80211_teardown_ap(struct i
nl80211_mgmt_unsubscribe(bss, "AP teardown");
nl80211_put_wiphy_data_ap(bss);
@@ -27,7 +27,7 @@
}
-@@ -7678,8 +7683,6 @@ static int wpa_driver_nl80211_if_remove(
+@@ -7679,8 +7684,6 @@ static int wpa_driver_nl80211_if_remove(
} else {
wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
nl80211_teardown_ap(bss);
@@ -36,7 +36,7 @@
nl80211_destroy_bss(bss);
if (!bss->added_if)
i802_set_iface_flags(bss, 0);
-@@ -8073,7 +8076,6 @@ static int wpa_driver_nl80211_deinit_ap(
+@@ -8074,7 +8077,6 @@ static int wpa_driver_nl80211_deinit_ap(
if (!is_ap_interface(drv->nlmode))
return -1;
wpa_driver_nl80211_del_beacon(bss);
@@ -44,7 +44,7 @@
/*
* If the P2P GO interface was dynamically added, then it is
-@@ -8093,7 +8095,6 @@ static int wpa_driver_nl80211_stop_ap(vo
+@@ -8094,7 +8096,6 @@ static int wpa_driver_nl80211_stop_ap(vo
if (!is_ap_interface(drv->nlmode))
return -1;
wpa_driver_nl80211_del_beacon(bss);