aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/hostapd/patches
diff options
context:
space:
mode:
authorDaniel Golle <daniel@makrotopia.org>2021-02-04 01:01:36 +0000
committerDaniel Golle <daniel@makrotopia.org>2021-02-04 01:05:32 +0000
commit7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef (patch)
tree85d977b7351a6e3a4ac836b6bad8b0671532a09c /package/network/services/hostapd/patches
parent104d60fe94cefc4009a9d65735afeedd46beaa5b (diff)
downloadupstream-7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef.tar.gz
upstream-7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef.tar.bz2
upstream-7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef.zip
hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P (Wi-Fi Direct) group information from active group owners. This issue was discovered by fuzz testing of wpa_supplicant by Google's OSS-Fuzz. https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Diffstat (limited to 'package/network/services/hostapd/patches')
0 files changed, 0 insertions, 0 deletions