ASA-202102-25 log original external raw

[ASA-202102-25] wpa_supplicant: arbitrary code execution
Arch Linux Security Advisory ASA-202102-25 ========================================== Severity: High Date : 2021-02-12 CVE-ID : CVE-2021-0326 Package : wpa_supplicant Type : arbitrary code execution Remote : Yes Link : Summary ======= The package wpa_supplicant before version 2:2.9-8 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 2:2.9-8. # pacman -Syu "wpa_supplicant>=2:2.9-8" The problem has been fixed upstream but no release is available yet. Workaround ========== The issue can be mitigated by disabling P2P, using the control interface command "P2P_SET disabled 1" or "p2p_disabled=1" in (each, if multiple interfaces used) wpa_supplicant configuration file. Description =========== A security issue was found in hostapd and wpa_supplicant version 2.9. A missing length check in the p2p_copy_client_info function could lead to a buffer overflow. Impact ====== An attacker within radio range of the device running P2P discovery might be able to cause a crash or execute arbitrary code. References ==========