hostapd: fix P2P group information processing vulnerability
authorDaniel Golle <daniel@makrotopia.org>
Thu, 4 Feb 2021 01:01:36 +0000 (01:01 +0000)
committerDaniel Golle <daniel@makrotopia.org>
Thu, 4 Feb 2021 01:05:32 +0000 (01:05 +0000)
commit7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef
tree85d977b7351a6e3a4ac836b6bad8b0671532a09c
parent104d60fe94cefc4009a9d65735afeedd46beaa5b
hostapd: fix P2P group information processing vulnerability

A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
package/network/services/hostapd/Makefile