Arch Linux Security Advisory ASA-202102-25

Severity: High
Date    : 2021-02-12
CVE-ID  : CVE-2021-0326
Package : wpa_supplicant
Type    : arbitrary code execution
Remote  : Yes
Link    :


The package wpa_supplicant before version 2:2.9-8 is vulnerable to
arbitrary code execution.


Upgrade to 2:2.9-8.

# pacman -Syu "wpa_supplicant>=2:2.9-8"

The problem has been fixed upstream but no release is available yet.


The issue can be mitigated by disabling P2P, using the control
interface command "P2P_SET disabled 1" or "p2p_disabled=1" in (each, if
multiple interfaces used) wpa_supplicant configuration file.


A security issue was found in hostapd and wpa_supplicant version 2.9. A
missing length check in the p2p_copy_client_info function could lead to
a buffer overflow.


An attacker within radio range of the device running P2P discovery
might be able to cause a crash or execute arbitrary code.