]> code.ossystems Code Review - openembedded-core.git/commit
wpa-supplicant: fix CVE-2021-27803
authorMinjae Kim <flowergom@gmail.com>
Mon, 8 Mar 2021 13:45:52 +0000 (22:45 +0900)
committerSteve Sakoman <steve@sakoman.com>
Mon, 8 Mar 2021 19:16:48 +0000 (09:16 -1000)
commit2877d0d42ffb656a6afa1f99084490ec4d84115b
tree7c3ea8c1118fdcdd5735c20b93ce61ba59377ce8
parentf5965d74822513e1edfc796b646e8a1ca2a50d65
wpa-supplicant: fix CVE-2021-27803

A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant
before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests.
It could result in denial of service or other impact
(potentially execution of arbitrary code), for an attacker within radio range.

Upstream-Status: Acepted [https://w1.fi/cgit/hostap/commit/?id=8460e3230988ef2ec13ce6b69b687e941f6cdb32]
CVE: CVE-2021-27803
Signed-off-by: Minjae Kim <flowergom@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2021-27803.patch [new file with mode: 0644]
meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.9.bb