wpa_supplicant - CVE-2015-1863 (dead code in DFly so not an issue)
authorMatthew Dillon <dillon@apollo.backplane.com>
Thu, 23 Apr 2015 23:56:54 +0000 (16:56 -0700)
committerMatthew Dillon <dillon@apollo.backplane.com>
Thu, 23 Apr 2015 23:56:54 +0000 (16:56 -0700)
commit584c4a9f0c9071cb62abe9c870a2b08afe746a88
tree7d39d7c74730923a51d3a12e386348f21fcb8abe
parent160242d432bd1f3e3ab3a2f7718e604e7ad315a9
wpa_supplicant - CVE-2015-1863 (dead code in DFly so not an issue)

* Correct buffer overflow from CVE-2015-1863.

* Note that this code is NOT compiled into DragonFly's wpa_supplicant anyway,
  so the security advisory is not applicable to DragonFly.  Fix the code
  anyway so it isn't accidently enabled with the security hole before the
  next vendor update.
contrib/wpa_supplicant/src/p2p/p2p.c