openwrt/package/network/services/hostapd
Daniel Golle ab9cb390be hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit 7c8c4f1be6)
2021-02-04 09:19:29 +01:00
..
files hostapd: cleanup IBSS-RSN 2020-01-16 17:32:02 +02:00
patches hostapd: fix P2P group information processing vulnerability 2021-02-04 09:19:29 +01:00
src hostapd: Update to version 2.8 (2019-04-21) 2019-11-14 20:59:58 +01:00
Config.in hostapd: add wpad-basic-wolfssl variant 2020-08-10 00:05:27 +02:00
Makefile hostapd: fix P2P group information processing vulnerability 2021-02-04 09:19:29 +01:00