nixpkgs/pkgs/os-specific/linux/wpa_supplicant
Martin Weinelt 0dd3c094ee
wpa_supplicant: fix for security advisory 2021-1
A vulnerability was discovered in how wpa_supplicant processes P2P
(Wi-Fi Direct) provision discovery requests. Under a corner case
condition, an invalid Provision Discovery Request frame could end up
reaching a state where the oldest peer entry needs to be removed. With
a suitably constructed invalid frame, this could result in use
(read+write) of freed memory. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially code execution.

https://w1.fi/security/2021-1/
2021-02-25 20:57:49 +01:00
..
default.nix wpa_supplicant: fix for security advisory 2021-1 2021-02-25 20:57:49 +01:00
gui.nix treewide: remove stdenv where not needed 2021-01-25 18:31:47 +01:00