summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorMartin Weinelt <hexa@darmstadt.ccc.de>2021-02-25 20:57:49 +0100
committerMartin Weinelt <hexa@darmstadt.ccc.de>2021-02-25 20:57:49 +0100
commit0dd3c094ee472cd9cd7074045fdd8752ad77eb0d (patch)
tree448e08092ba8120d620c920e1140d4e2c102aca4 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parentb9a45e769ac857a8cf6f6957f7fae6a77af7859a (diff)
wpa_supplicant: fix for security advisory 2021-1
A vulnerability was discovered in how wpa_supplicant processes P2P (Wi-Fi Direct) provision discovery requests. Under a corner case condition, an invalid Provision Discovery Request frame could end up reaching a state where the oldest peer entry needs to be removed. With a suitably constructed invalid frame, this could result in use (read+write) of freed memory. This can result in an attacker within radio range of the device running P2P discovery being able to cause unexpected behavior, including termination of the wpa_supplicant process and potentially code execution. https://w1.fi/security/2021-1/
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions