openwrt/package
Daniel Golle 7c8c4f1be6 hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-02-04 01:05:32 +00:00
..
base-files base-files: mount pstore if present 2021-01-29 22:26:36 +01:00
boot arm-trusted-firmware-mediatek: make use of trusted-firmware-a.mk 2021-02-03 15:19:14 +00:00
devel strace: update package to v5.10 2021-01-30 01:03:00 +01:00
firmware linux-firmware: Add wil6210 firmware 2021-01-05 02:16:24 +00:00
kernel mac80211: fix station rate table updates on assoc 2021-02-01 10:00:23 +01:00
libs mbedtls: update to 2.16.9 2021-01-18 00:49:14 +01:00
network hostapd: fix P2P group information processing vulnerability 2021-02-04 01:05:32 +00:00
system procd: update to git HEAD 2021-02-02 13:29:36 +00:00
utils util-linux: remove custom pkgconfig patch 2021-01-31 16:25:08 +01:00
Makefile build: always build package/kernel/linux 2020-10-15 13:25:58 +02:00