package/wpa_supplicant: add upstream 2019-5 security patches
authorPeter Korsgaard <peter@korsgaard.com>
Fri, 26 Apr 2019 12:15:22 +0000 (14:15 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Sat, 27 Apr 2019 12:24:36 +0000 (14:24 +0200)
commitc21edddec9043617f9a1d7fe8ad8ea1770846b82
tree7f46d26c158c2856e429e923e9ef3bc0784f20c2
parentb3adfacdb110fe5508284cf5159447492cffe944
package/wpa_supplicant: add upstream 2019-5 security patches

Fixes the following security vulnerabilities:

EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP
peer) was discovered not to validate fragmentation reassembly state
properly for a case where an unexpected fragment could be received. This
could result in process termination due to NULL pointer dereference.

For details, see the advisory:
https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/wpa_supplicant/wpa_supplicant.hash
package/wpa_supplicant/wpa_supplicant.mk