FS#69525 - [wpa_supplicant] [Security] arbitrary code execution (CVE-2021-0326)
Attached to Project:
Arch Linux
Opened by Jonas Witschel (diabonas) - Wednesday, 03 February 2021, 23:24 GMT
Last edited by Felix Yan (felixonmars) - Friday, 19 March 2021, 14:32 GMT
Opened by Jonas Witschel (diabonas) - Wednesday, 03 February 2021, 23:24 GMT
Last edited by Felix Yan (felixonmars) - Friday, 19 March 2021, 14:32 GMT
|
Details
Summary
======= The package wpa_supplicant is vulnerable to arbitrary code execution via CVE-2021-0326. Guidance ======== Applying commit 947272febe24a8f0ea828b5b2f35f13c3821901e referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-1530 https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27269 https://w1.fi/cgit/hostap/commit/?id=947272febe24a8f0ea828b5b2f35f13c3821901e |
This task depends upon
Closed by Felix Yan (felixonmars)
Friday, 19 March 2021, 14:32 GMT
Reason for closing: Fixed
Additional comments about closing: wpa_supplicant 2:2.9-8
Friday, 19 March 2021, 14:32 GMT
Reason for closing: Fixed
Additional comments about closing: wpa_supplicant 2:2.9-8