summaryrefslogtreecommitdiffstats
path: root/meta/recipes-graphics
diff options
context:
space:
mode:
authorStefan Ghinea <stefan.ghinea@windriver.com>2021-03-03 20:53:08 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-03-28 22:31:55 +0100
commita93d0c1f6d0bc3f19bd16154418459f977c442b1 (patch)
tree6beb896a9f34bc565741201ec14b65098e181184 /meta/recipes-graphics
parent26d01d44fb03101ae5e0a096d95838e5e20deeb2 (diff)
downloadpoky-a93d0c1f6d0bc3f19bd16154418459f977c442b1.tar.gz
wpa-supplicant: fix CVE-2021-27803
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. References: https://nvd.nist.gov/vuln/detail/CVE-2021-27803 Upstream patches: https://w1.fi/cgit/hostap/commit/?id=8460e3230988ef2ec13ce6b69b687e941f6cdb32 (From OE-Core rev: 5dc8a0a3a22add1e0bb9970c37d014b4abbca049) Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 81e4260b83c52558c320fd7d1c1eafcb312ad6be) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics')
0 files changed, 0 insertions, 0 deletions