CVE-2021-0326 log
Source |
|
Severity | High |
Remote | Yes |
Type | Arbitrary code execution |
Description | A security issue was found in hostapd and wpa_supplicant version 2.9. A missing length check in the p2p_copy_client_info function could lead to a buffer overflow. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1530 | wpa_supplicant | 2:2.9-7 | 2:2.9-8 | High | Fixed | FS#69525 |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
12 Feb 2021 | ASA-202102-25 | AVG-1530 | wpa_supplicant | High | arbitrary code execution |
Notes |
---|
Workaround ========== The issue can be mitigated by disabling P2P, using the control interface command "P2P_SET disabled 1" or "p2p_disabled=1" in (each, if multiple interfaces used) wpa_supplicant configuration file. |