[openwrt/openwrt] hostapd: fix P2P group information processing vulnerability

LEDE Commits lede-commits at lists.infradead.org
Wed Feb 3 20:13:03 EST 2021


dangole pushed a commit to openwrt/openwrt.git, branch master:
https://git.openwrt.org/7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef

commit 7c8c4f1be648aff9f1072ee27a2cc8f6a4a788ef
Author: Daniel Golle <daniel at makrotopia.org>
AuthorDate: Thu Feb 4 01:01:36 2021 +0000

    hostapd: fix P2P group information processing vulnerability
    
    A vulnerability was discovered in how wpa_supplicant processing P2P
    (Wi-Fi Direct) group information from active group owners.
    This issue was discovered by fuzz testing of wpa_supplicant by Google's
    OSS-Fuzz.
    
    https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt
    
    Signed-off-by: Daniel Golle <daniel at makrotopia.org>
---
 package/network/services/hostapd/Makefile | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/package/network/services/hostapd/Makefile b/package/network/services/hostapd/Makefile
index cbbe6c1009..3b6ce617d3 100644
--- a/package/network/services/hostapd/Makefile
+++ b/package/network/services/hostapd/Makefile
@@ -7,7 +7,7 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=hostapd
-PKG_RELEASE:=28
+PKG_RELEASE:=29
 
 PKG_SOURCE_URL:=http://w1.fi/hostap.git
 PKG_SOURCE_PROTO:=git



More information about the lede-commits mailing list