From: Daniel Golle Date: Thu, 4 Feb 2021 01:01:36 +0000 (+0000) Subject: hostapd: fix P2P group information processing vulnerability X-Git-Url: http://git.lede-project.org./?a=commitdiff_plain;h=7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef;p=openwrt%2Fstaging%2Fthess.git hostapd: fix P2P group information processing vulnerability A vulnerability was discovered in how wpa_supplicant processing P2P (Wi-Fi Direct) group information from active group owners. This issue was discovered by fuzz testing of wpa_supplicant by Google's OSS-Fuzz. https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt Signed-off-by: Daniel Golle --- diff --git a/package/network/services/hostapd/Makefile b/package/network/services/hostapd/Makefile index cbbe6c1009..3b6ce617d3 100644 --- a/package/network/services/hostapd/Makefile +++ b/package/network/services/hostapd/Makefile @@ -7,7 +7,7 @@ include $(TOPDIR)/rules.mk PKG_NAME:=hostapd -PKG_RELEASE:=28 +PKG_RELEASE:=29 PKG_SOURCE_URL:=http://w1.fi/hostap.git PKG_SOURCE_PROTO:=git