aboutsummaryrefslogtreecommitdiffstats
path: root/include/image-commands.mk
diff options
context:
space:
mode:
authorDaniel Golle <daniel@makrotopia.org>2021-02-04 01:01:36 +0000
committerPetr Štetiar <ynezz@true.cz>2021-02-04 09:19:29 +0100
commitab9cb390beacfcfef4cdd6cecfc71b64ac98240b (patch)
treef3ad40bc06d64c2f4a2910483675d00cedc1bd67 /include/image-commands.mk
parent1e90091c5d329e74ad72c511bf767156dc8ec6d9 (diff)
downloadupstream-ab9cb390beacfcfef4cdd6cecfc71b64ac98240b.tar.gz
upstream-ab9cb390beacfcfef4cdd6cecfc71b64ac98240b.tar.bz2
upstream-ab9cb390beacfcfef4cdd6cecfc71b64ac98240b.zip
hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P (Wi-Fi Direct) group information from active group owners. This issue was discovered by fuzz testing of wpa_supplicant by Google's OSS-Fuzz. https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt Signed-off-by: Daniel Golle <daniel@makrotopia.org> [added the missing patch] Signed-off-by: Petr Štetiar <ynezz@true.cz> (cherry-picked from commit 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef)
Diffstat (limited to 'include/image-commands.mk')
0 files changed, 0 insertions, 0 deletions