Buffer overflow in p2p_copy_client_info (CVE-2021-0326)
diabonas at archlinux.org
Wed Feb 3 11:51:02 EST 2021
according to the recently released Android Security Bulletin—February 2021 ,
wpa_supplicant as used by Android is affected by a buffer overflow in
p2p_copy_client_info. The issue is deemed critical by Google and given the CVE
identifier CVE-2021-0326, a patch is available at .
However, I could not find this patch in the current master branch of the
upstream hostapd repository at w1.fi . Should it be applied upstream as
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the Hostap