9ada4eb2f1
Fixes the following security issue: - wpa_supplicant P2P provision discovery processing vulnerability (no CVE yet) A vulnerability was discovered in how wpa_supplicant processes P2P (Wi-Fi Direct) provision discovery requests. Under a corner case condition, an invalid Provision Discovery Request frame could end up reaching a state where the oldest peer entry needs to be removed. With a suitably constructed invalid frame, this could result in use (read+write) of freed memory. This can result in an attacker within radio range of the device running P2P discovery being able to cause unexpected behavior, including termination of the wpa_supplicant process and potentially code execution. For more details, see the advisory: https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt Signed-off-by: Peter Korsgaard <peter@korsgaard.com> [yann.morin.1998@free.fr: actually add the patch URL to the patch list] Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr> |
||
---|---|---|
.. | ||
50-wpa_supplicant.preset | ||
0001-AP-Silently-ignore-management-frame-from-unexpected-.patch | ||
Config.in | ||
wpa_supplicant.conf | ||
wpa_supplicant.hash | ||
wpa_supplicant.mk |