Daniel Golle ab9cb390be hostapd: fix P2P group information processing vulnerability
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners.
This issue was discovered by fuzz testing of wpa_supplicant by Google's
OSS-Fuzz.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
[added the missing patch]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry-picked from commit 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef)
2021-02-04 09:19:29 +01:00
..
2021-01-24 17:42:53 +01:00
2018-07-30 10:43:36 +02:00
2017-10-08 20:51:03 +03:00
2019-05-11 16:37:11 +02:00
2020-05-08 20:35:50 +02:00
2020-02-26 16:40:43 +01:00
2020-04-27 10:58:16 +01:00
2020-11-20 22:53:04 +01:00
2020-04-27 10:58:15 +01:00