[ASA-202102-25] wpa_supplicant: arbitrary code execution

Morten Linderud foxboron at archlinux.org
Mon Feb 22 22:39:18 UTC 2021


Arch Linux Security Advisory ASA-202102-25
==========================================

Severity: High
Date    : 2021-02-12
CVE-ID  : CVE-2021-0326
Package : wpa_supplicant
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1530

Summary
=======

The package wpa_supplicant before version 2:2.9-8 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 2:2.9-8.

# pacman -Syu "wpa_supplicant>=2:2.9-8"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

The issue can be mitigated by disabling P2P, using the control
interface command "P2P_SET disabled 1" or "p2p_disabled=1" in (each, if
multiple interfaces used) wpa_supplicant configuration file.

Description
===========

A security issue was found in hostapd and wpa_supplicant version 2.9. A
missing length check in the p2p_copy_client_info function could lead to
a buffer overflow.

Impact
======

An attacker within radio range of the device running P2P discovery
might be able to cause a crash or execute arbitrary code.

References
==========

https://bugs.archlinux.org/task/69525
https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27269
https://w1.fi/cgit/hostap/commit/?id=947272febe24a8f0ea828b5b2f35f13c3821901e
https://security.archlinux.org/CVE-2021-0326
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210222/ecf9de58/attachment.sig>


More information about the arch-security mailing list