kumquat-buildroot/package/hostapd
Peter Korsgaard b3adfacdb1 package/hostapd: add upstream 2019-5 security patches
Fixes the following security vulnerabilities:

EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP
peer) was discovered not to validate fragmentation reassembly state
properly for a case where an unexpected fragment could be received. This
could result in process termination due to NULL pointer dereference.

For details, see the advisory:
https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-04-27 14:24:36 +02:00
..
Config.in
hostapd.hash package/hostapd: add upstream 2019-5 security patches 2019-04-27 14:24:36 +02:00
hostapd.mk package/hostapd: add upstream 2019-5 security patches 2019-04-27 14:24:36 +02:00