hostapd: fix P2P group information processing vulnerability
authorDaniel Golle <daniel@makrotopia.org>
Thu, 4 Feb 2021 01:01:36 +0000 (01:01 +0000)
committerPetr Štetiar <ynezz@true.cz>
Thu, 4 Feb 2021 08:19:29 +0000 (09:19 +0100)
commitab9cb390beacfcfef4cdd6cecfc71b64ac98240b
treef3ad40bc06d64c2f4a2910483675d00cedc1bd67
parent1e90091c5d329e74ad72c511bf767156dc8ec6d9
hostapd: fix P2P group information processing vulnerability

A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef)
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/801-P2P-Fix-copying-of-secondary-device-types-for-P2P-gr.patch [new file with mode: 0644]