[Midnightbsd-cvs] [MidnightBSD/src] a4485b: A vulnerability was discovered in how wpa_supplica...
Lucas Holt
noreply at github.com
Mon Nov 15 01:16:08 EST 2021
Branch: refs/heads/master
Home: https://github.com/MidnightBSD/src
Commit: a4485b0530ad002fcf11afd9935f0bf3d6e96e1f
https://github.com/MidnightBSD/src/commit/a4485b0530ad002fcf11afd9935f0bf3d6e96e1f
Author: Lucas Holt <luke at foolishgames.com>
Date: 2021-11-15 (Mon, 15 Nov 2021)
Changed paths:
M contrib/wpa/src/p2p/p2p_pd.c
Log Message:
-----------
A vulnerability was discovered in how wpa_supplicant processes P2P
(Wi-Fi Direct) provision discovery requests. Under a corner case
condition, an invalid Provision Discovery Request frame could end up
reaching a state where the oldest peer entry needs to be removed. With
a suitably constructed invalid frame, this could result in use
(read+write) of freed memory. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially code execution.
More information about the Midnightbsd-cvs
mailing list