hostapd: Fix AP mode PMF disconnection protection bypass
This fixes
* CVE-2019-16275 AP mode PMF disconnection protection bypass
https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
(cherry picked from commit a6981604b3)
			
			
This commit is contained in:
		@@ -178,7 +178,7 @@
 | 
			
		||||
 /*
 | 
			
		||||
--- a/src/ap/drv_callbacks.c
 | 
			
		||||
+++ b/src/ap/drv_callbacks.c
 | 
			
		||||
@@ -1527,8 +1527,8 @@ static void hostapd_event_wds_sta_interf
 | 
			
		||||
@@ -1540,8 +1540,8 @@ static void hostapd_event_wds_sta_interf
 | 
			
		||||
 }
 | 
			
		||||
 
 | 
			
		||||
 
 | 
			
		||||
@@ -189,7 +189,7 @@
 | 
			
		||||
 {
 | 
			
		||||
 	struct hostapd_data *hapd = ctx;
 | 
			
		||||
 #ifndef CONFIG_NO_STDOUT_DEBUG
 | 
			
		||||
@@ -1757,7 +1757,7 @@ void wpa_supplicant_event(void *ctx, enu
 | 
			
		||||
@@ -1770,7 +1770,7 @@ void wpa_supplicant_event(void *ctx, enu
 | 
			
		||||
 }
 | 
			
		||||
 
 | 
			
		||||
 
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user