Cy Schubert eeb26cf52c wpa: import fix for P2P provision discovery processing vulnerability
Latest version available from: https://w1.fi/security/2021-1/

Vulnerability

A vulnerability was discovered in how wpa_supplicant processes P2P
(Wi-Fi Direct) provision discovery requests. Under a corner case
condition, an invalid Provision Discovery Request frame could end up
reaching a state where the oldest peer entry needs to be removed. With
a suitably constructed invalid frame, this could result in use
(read+write) of freed memory. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially code execution.

Vulnerable versions/configurations

wpa_supplicant v1.0-v2.9 with CONFIG_P2P build option enabled

An attacker (or a system controlled by the attacker) needs to be within
radio range of the vulnerable system to send a set of suitably
constructed management frames that trigger the corner case to be reached
in the management of the P2P peer table.

Note: FreeBSD base does not enable P2P.
2021-03-17 06:06:55 -07:00
..
2021-03-05 12:33:01 +01:00
2021-02-10 22:03:22 -08:00
2021-03-01 16:01:44 +01:00
2020-12-10 10:58:30 +00:00
2020-10-24 15:58:42 +00:00
2021-01-13 23:56:18 -06:00
2020-10-24 17:08:59 +00:00
2021-02-26 16:32:01 +01:00
2021-02-23 17:47:07 +00:00
2021-01-12 00:56:35 +02:00
2021-01-25 20:24:44 -08:00
2021-03-14 19:33:13 +03:00
2021-01-02 21:03:28 +02:00
2021-02-18 19:10:33 +01:00