A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wpa_supplicant | W1.fi | 1.0 (including) | 2.10 (excluding) |
Wpa | Ubuntu | bionic | * |
Wpa | Ubuntu | devel | * |
Wpa | Ubuntu | focal | * |
Wpa | Ubuntu | groovy | * |
Wpa | Ubuntu | trusty | * |
Wpa | Ubuntu | trusty/esm | * |
Wpa | Ubuntu | upstream | * |
Wpa | Ubuntu | xenial | * |
Red Hat Enterprise Linux 7 | RedHat | wpa_supplicant-1:2.6-12.el7_9.2 | * |
Red Hat Enterprise Linux 8 | RedHat | wpa_supplicant-1:2.9-2.el8_3.1 | * |
Red Hat Enterprise Linux 8.1 Extended Update Support | RedHat | wpa_supplicant-1:2.7-2.el8_1.1 | * |
Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | wpa_supplicant-1:2.9-2.el8_2.1 | * |