[Midnightbsd-cvs] [MidnightBSD/src] a4485b: A vulnerability was discovered in how wpa_supplica...

Lucas Holt noreply at github.com
Mon Nov 15 01:16:08 EST 2021


  Branch: refs/heads/master
  Home:   https://github.com/MidnightBSD/src
  Commit: a4485b0530ad002fcf11afd9935f0bf3d6e96e1f
      https://github.com/MidnightBSD/src/commit/a4485b0530ad002fcf11afd9935f0bf3d6e96e1f
  Author: Lucas Holt <luke at foolishgames.com>
  Date:   2021-11-15 (Mon, 15 Nov 2021)

  Changed paths:
    M contrib/wpa/src/p2p/p2p_pd.c

  Log Message:
  -----------
  A vulnerability was discovered in how wpa_supplicant processes P2P
(Wi-Fi Direct) provision discovery requests. Under a corner case
condition, an invalid Provision Discovery Request frame could end up
reaching a state where the oldest peer entry needs to be removed. With
a suitably constructed invalid frame, this could result in use
(read+write) of freed memory. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially code execution.




More information about the Midnightbsd-cvs mailing list