A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Wpa_supplicant | W1.fi | 1.0 (including) | 2.10 (excluding) | 
| Red Hat Enterprise Linux 7 | RedHat | wpa_supplicant-1:2.6-12.el7_9.2 | * | 
| Red Hat Enterprise Linux 8 | RedHat | wpa_supplicant-1:2.9-2.el8_3.1 | * | 
| Red Hat Enterprise Linux 8.1 Extended Update Support | RedHat | wpa_supplicant-1:2.7-2.el8_1.1 | * | 
| Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | wpa_supplicant-1:2.9-2.el8_2.1 | * | 
| Wpa | Ubuntu | bionic | * | 
| Wpa | Ubuntu | devel | * | 
| Wpa | Ubuntu | esm-infra-legacy/trusty | * | 
| Wpa | Ubuntu | esm-infra/bionic | * | 
| Wpa | Ubuntu | esm-infra/focal | * | 
| Wpa | Ubuntu | esm-infra/xenial | * | 
| Wpa | Ubuntu | focal | * | 
| Wpa | Ubuntu | groovy | * | 
| Wpa | Ubuntu | trusty | * | 
| Wpa | Ubuntu | trusty/esm | * | 
| Wpa | Ubuntu | upstream | * | 
| Wpa | Ubuntu | xenial | * |