hostapd: fix remote denial of service vulnerability in WMM action frame parsing
authornbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Wed, 6 May 2015 09:45:39 +0000 (09:45 +0000)
committernbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Wed, 6 May 2015 09:45:39 +0000 (09:45 +0000)
commit4fec525b976e592314a023c3652f83379c24c8ad
treec415de738c96797fa2a3d127af83a6fda3ae5be2
parent3533154d9f9e4884197225d720df9396fb07cdf7
hostapd: fix remote denial of service vulnerability in WMM action frame parsing

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@45619 3c298f89-4303-0410-b956-a3cf2f4a3e73
package/network/services/hostapd/patches/002-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch [new file with mode: 0644]