diff options
author | Daniel Golle <daniel@makrotopia.org> | 2021-02-04 01:01:36 +0000 |
---|---|---|
committer | Daniel Golle <daniel@makrotopia.org> | 2021-02-04 01:05:32 +0000 |
commit | 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef (patch) | |
tree | 85d977b7351a6e3a4ac836b6bad8b0671532a09c /package/network/config | |
parent | 104d60fe94cefc4009a9d65735afeedd46beaa5b (diff) | |
download | upstream-7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef.tar.gz upstream-7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef.tar.bz2 upstream-7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef.zip |
hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.
https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Diffstat (limited to 'package/network/config')
0 files changed, 0 insertions, 0 deletions