diff options
author | Stefan Ghinea <stefan.ghinea@windriver.com> | 2021-03-03 20:53:08 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-03-06 22:39:03 +0000 |
commit | 5623cf33c13358df3ed34882ceed9ca79965fde2 (patch) | |
tree | 47c68c8ae497a3691c8aa981b71c7982bf375472 /meta/recipes-devtools | |
parent | ca1382756c0a26b1ff7b46a61079704d4b11c57c (diff) | |
download | poky-5623cf33c13358df3ed34882ceed9ca79965fde2.tar.gz |
wpa-supplicant: fix CVE-2021-27803
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant
before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests.
It could result in denial of service or other impact (potentially
execution of arbitrary code), for an attacker within radio range.
References:
https://nvd.nist.gov/vuln/detail/CVE-2021-27803
Upstream patches:
https://w1.fi/cgit/hostap/commit/?id=8460e3230988ef2ec13ce6b69b687e941f6cdb32
(From OE-Core rev: 81e4260b83c52558c320fd7d1c1eafcb312ad6be)
Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools')
0 files changed, 0 insertions, 0 deletions