Hi Tim,
On 2/5/20 5:19 PM, Tim Kourt wrote:
Processing the duplicated TLVs while connecting to a malicious AP may
lead
to overflow of the response buffer. This patch ensures that the
duplicated TLVs are not parsed.
---
src/eap-peap.c | 12 ++++++++++++
1 file changed, 12 insertions(+)
Applied, thanks.
Regards,
-Denis