Skip to content
Snippets Groups Projects
Commit 7c8c4f1b authored by Daniel Golle's avatar Daniel Golle
Browse files

hostapd: fix P2P group information processing vulnerability

A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt



Signed-off-by: default avatarDaniel Golle <daniel@makrotopia.org>
parent 104d60fe
No related branches found
No related tags found
No related merge requests found
......@@ -7,7 +7,7 @@
include $(TOPDIR)/rules.mk
PKG_NAME:=hostapd
PKG_RELEASE:=28
PKG_RELEASE:=29
PKG_SOURCE_URL:=http://w1.fi/hostap.git
PKG_SOURCE_PROTO:=git
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment