tn3399_openwrt/package/network/services/hostapd
Daniel Golle 7c8c4f1be6 hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-02-04 01:05:32 +00:00
..
files hostapd: fix setting wps_state to "not configured" 2021-01-15 18:17:45 +01:00
patches hostapd: fix patch offset 2020-11-23 22:53:15 +01:00
src hostapd: return PID on config_add call 2021-01-10 19:15:51 +00:00
Config.in treewide: nuke DRIVER_11W_SUPPORT 2020-12-23 16:36:08 +01:00
Makefile hostapd: fix P2P group information processing vulnerability 2021-02-04 01:05:32 +00:00