diff options
author | Daniel Golle <daniel@makrotopia.org> | 2021-02-04 01:01:36 +0000 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2021-02-04 09:19:29 +0100 |
commit | ab9cb390beacfcfef4cdd6cecfc71b64ac98240b (patch) | |
tree | f3ad40bc06d64c2f4a2910483675d00cedc1bd67 /include/image-commands.mk | |
parent | 1e90091c5d329e74ad72c511bf767156dc8ec6d9 (diff) | |
download | upstream-ab9cb390beacfcfef4cdd6cecfc71b64ac98240b.tar.gz upstream-ab9cb390beacfcfef4cdd6cecfc71b64ac98240b.tar.bz2 upstream-ab9cb390beacfcfef4cdd6cecfc71b64ac98240b.zip |
hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.
https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef)
Diffstat (limited to 'include/image-commands.mk')
0 files changed, 0 insertions, 0 deletions