hostapd: fix remote denial of service vulnerability in WMM action frame parsing
authornbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Wed, 6 May 2015 09:47:05 +0000 (09:47 +0000)
committernbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Wed, 6 May 2015 09:47:05 +0000 (09:47 +0000)
commit179bab8b1700d74b28cc6cd25322f9a1ad670107
treea16a6821379fa2a5b5771c2faadb05f675878310
parent229d60fdb45c34902d402938e231c006f7c73931
hostapd: fix remote denial of service vulnerability in WMM action frame parsing

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r45619

git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@45620 3c298f89-4303-0410-b956-a3cf2f4a3e73
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/002-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch [new file with mode: 0644]