summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2021-27803.patch
Commit message (Collapse)AuthorAgeFilesLines
* wpa-supplicant: update CVE-2021-27803.patchMartin Jansa2021-03-281-4/+8
| | | | | | | | | | | * update to match what was merged in master branch (and I have now sent for gatesgarth) * fixes Upstream-Status (there is a missing 'c' in 'Acepted' and 'Backport' is more accurate) (From OE-Core rev: 060587ae477d785db017f4d8a2152206c258da42) Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* wpa-supplicant: fix CVE-2021-27803Minjae Kim2021-03-181-0/+54
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. Upstream-Status: Acepted [https://w1.fi/cgit/hostap/commit/?id=8460e3230988ef2ec13ce6b69b687e941f6cdb32] CVE: CVE-2021-27803 (From OE-Core rev: 2877d0d42ffb656a6afa1f99084490ec4d84115b) Signed-off-by: Minjae Kim <flowergom@gmail.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>