Alexander Mukhin
b35ac6fac9
package/hostapd: remove support for Realtek drivers
...
After hostapd update to 2.9, the patch provided no longer works,
although applies. Moreover, AP support for Realtek chips is broken
anyway in kernels > 4.9.
Signed-off-by: Alexander Mukhin <alexander.i.mukhin@gmail.com >
[Thomas: add Config.in.legacy handling]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com >
2019-09-07 14:36:23 +02:00
Bernd Kuhls
9aca253656
package/hostapd: security bump version to 2.9
...
Fixes https://w1.fi/security/2019-6/
Release notes:
http://lists.infradead.org/pipermail/hostap/2019-April/039979.html
http://lists.infradead.org/pipermail/hostap/2019-August/040373.html
This release includes all patches from https://w1.fi/security/
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de >
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
2019-08-28 14:33:15 +02:00
Peter Korsgaard
b3adfacdb1
package/hostapd: add upstream 2019-5 security patches
...
Fixes the following security vulnerabilities:
EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP
peer) was discovered not to validate fragmentation reassembly state
properly for a case where an unexpected fragment could be received. This
could result in process termination due to NULL pointer dereference.
For details, see the advisory:
https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
2019-04-27 14:24:36 +02:00
Peter Korsgaard
736f344755
package/hostapd: add upstream 2019-1, 2, 3, 4 security patches
...
Fixes the following security vulnerabilities:
- CVE-2019-9494 (cache attack against SAE)
For details, see the advisory:
https://w1.fi/security/2019-1/sae-side-channel-attacks.txt
- CVE-2019-9495 (cache attack against EAP-pwd)
For details, see the advisory:
https://w1.fi/security/2019-2/eap-pwd-side-channel-attack.txt
- CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP)
For details, see the advisory:
https://w1.fi/security/2019-3/sae-confirm-missing-state-validation.txt
- CVE-2019-9497 (EAP-pwd server not checking for reflection attack)
- CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element)
- CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element)
For details, see the advisory:
https://w1.fi/security/2019-4/eap-pwd-missing-commit-validation.txt
Notice that SAE is not currently enabled in Buildroot, but the patches are
included here anyway for completeness.
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com >
2019-04-11 18:25:28 +02:00
Bernd Kuhls
eb7489dc79
package/hostapd: bump version to 2.7
...
Added license hash, removed patches included in new version.
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de >
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com >
2018-12-16 12:24:14 +01:00
Alexander Mukhin
5a0cfbded0
hostapd: add support for Realtek driver
...
Since kernel drivers for Realtek wireless chips use non-standard
interfaces, upstream hostapd does not support them. One have to apply
an external patch for hostapd to work with these chips. See:
https://github.com/pritambaral/hostapd-rtl871xdrv
A configuration option is added to enable support for Realtek chips,
and it's turned off by default.
Signed-off-by: Alexander Mukhin <alexander.i.mukhin@gmail.com >
Tested-by: Angelo Compagnucci <angelo.compagnucci@gmail.com >
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com >
2017-11-24 21:45:17 +01:00
Peter Korsgaard
5259c5c805
hostapd: add upstream security fixes
...
Fixes CVE-2017-13082
http://lists.infradead.org/pipermail/hostap/2017-October/037989.html
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
2017-10-17 21:39:54 +02:00
Jörg Krause
9f03a7aeec
package/hostapd: bump to version 2.6
...
Remove all patches as they are applied to or were fetched from upstream.
Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks >
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
2016-10-13 08:03:37 +02:00
Baruch Siach
1639a7ebfa
hostapd: bump to version 2.5
...
Remove upstream patches.
Signed-off-by: Baruch Siach <baruch@tkos.co.il >
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
2015-09-30 00:24:43 +02:00
Jörg Krause
dd505a7e51
package/hostapd: bump to version 2.4
...
Also:
- remove patches: merged upstream
- update hash
Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks >
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com >
2015-03-16 16:09:04 +01:00
Gustavo Zacarias
ee1b691e0a
hostapd: add hash
...
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar >
Signed-off-by: Peter Korsgaard <peter@korsgaard.com >
2014-10-14 17:27:46 +02:00