hostapd: fix P2P group information processing vulnerability
authorDaniel Golle <daniel@makrotopia.org>
Thu, 4 Feb 2021 01:01:36 +0000 (01:01 +0000)
committerRISCi_ATOM <bob@bobcall.me>
Wed, 17 Feb 2021 15:10:59 +0000 (15:10 +0000)
commit068f6e4c2f697a7266e36f239f463ddf45593df2
treed7ba014e5887c5bda88d4faee4996a941034c29d
parentc72e28169f2103a3cb2022452aaaf7295453e783
hostapd: fix P2P group information processing vulnerability

A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef)
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/801-P2P-Fix-copying-of-secondary-device-types-for-P2P-gr.patch [new file with mode: 0644]