mirror of
https://git.openwrt.org/openwrt/openwrt.git
synced 2026-02-02 05:33:11 +01:00
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.
https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit
|
||
|---|---|---|
| .. | ||
| dnsmasq | ||
| dropbear | ||
| ead | ||
| hostapd | ||
| igmpproxy | ||
| ipset-dns | ||
| lldpd | ||
| odhcpd | ||
| omcproxy | ||
| openvpn | ||
| openvpn-easy-rsa | ||
| ppp | ||
| relayd | ||
| samba36 | ||
| uhttpd | ||
| umdns | ||
| wireguard | ||