openwrt/package/network/services/hostapd
Hauke Mehrtens 987275f565 hostapd: backport fix for CVE-2023-52160
Fix a authentication bypass problem in WPA Enterprise client mode. See
here for details: https://www.top10vpn.com/research/wifi-vulnerabilities/
This problem was assigned CVE-2023-52160

This problem was fixed in upstream hostapd in June 2023. Hostapd used in
OpenWrt 23.05 and later already contains this fix..

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2024-02-22 21:50:16 +01:00
..
files hostapd: remove invalid dtim_period option processing 2022-11-10 13:10:20 +01:00
patches hostapd: backport fix for CVE-2023-52160 2024-02-22 21:50:16 +01:00
src hostapd: add missing return code for the bss_mgmt_enable ubus method 2023-04-02 22:07:27 +02:00
Config.in treewide: nuke DRIVER_11W_SUPPORT 2020-12-23 16:36:08 +01:00
Makefile hostapd: fix broke noscan option for mesh 2023-11-09 16:18:58 +01:00