From a6981604b30bc1ddc1713b368fe853d89c2ba40d Mon Sep 17 00:00:00 2001 From: Hauke Mehrtens Date: Fri, 20 Sep 2019 22:20:16 +0200 Subject: hostapd: Fix AP mode PMF disconnection protection bypass This fixes * CVE-2019-16275 AP mode PMF disconnection protection bypass https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt Signed-off-by: Hauke Mehrtens --- package/network/services/hostapd/patches/200-multicall.patch | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'package/network/services/hostapd/patches/200-multicall.patch') diff --git a/package/network/services/hostapd/patches/200-multicall.patch b/package/network/services/hostapd/patches/200-multicall.patch index 9c7936695a..6d742ace77 100644 --- a/package/network/services/hostapd/patches/200-multicall.patch +++ b/package/network/services/hostapd/patches/200-multicall.patch @@ -178,7 +178,7 @@ /* --- a/src/ap/drv_callbacks.c +++ b/src/ap/drv_callbacks.c -@@ -1527,8 +1527,8 @@ static void hostapd_event_wds_sta_interf +@@ -1540,8 +1540,8 @@ static void hostapd_event_wds_sta_interf } @@ -189,7 +189,7 @@ { struct hostapd_data *hapd = ctx; #ifndef CONFIG_NO_STDOUT_DEBUG -@@ -1757,7 +1757,7 @@ void wpa_supplicant_event(void *ctx, enu +@@ -1770,7 +1770,7 @@ void wpa_supplicant_event(void *ctx, enu } -- cgit v1.2.3