openwrt/package
Daniel Golle ab9cb390be hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit 7c8c4f1be6)
2021-02-04 09:19:29 +01:00
..
base-files OpenWrt v19.07.6: revert to branch defaults 2021-01-19 15:12:28 +01:00
boot uboot-at91: Add PKG_MIRROR_HASH to fix download 2021-01-18 22:13:08 +01:00
devel perf: build with NO_LIBCAP=1 2020-05-05 00:05:28 +02:00
firmware wireless-regdb: Update to version 2020.11.20 2020-12-16 22:23:52 +01:00
kernel mt76: update to the latest version 2021-02-01 13:09:37 +01:00
libs wolfssl: enable HAVE_SECRET_CALLBACK 2021-02-02 10:09:37 +01:00
network hostapd: fix P2P group information processing vulnerability 2021-02-04 09:19:29 +01:00
system opkg: update to latest git HEAD of branch openwrt-19.07 2021-02-03 22:37:31 +01:00
utils busybox: delete redundant patch 2020-08-12 11:10:16 +02:00
Makefile packages: apply usign padding workarounds to package indexes if needed 2019-08-07 07:22:37 +02:00