Please read this before reporting a bug:
https://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
Attached to Project:
Arch Linux
Opened by Jonas Witschel (diabonas) - Thursday, 25 February 2021, 19:16 GMT
Last edited by Andreas Radke (AndyRTR) - Friday, 26 February 2021, 11:14 GMT
|
DetailsSummary The package wpa_supplicant is vulnerable to denial of service, and possibly arbitrary code execution.
Guidance Applying the patch referenced below (corresponding to upstream commit 8460e3230988ef2ec13ce6b69b687e941f6cdb32) fixes the issue.
References
https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt |
This task depends upon
This is now tracked as CVE-2021-27803 (https://security.archlinux.org/CVE-2021-27803).
Another issue has recently been discovered that could potentially allow signature forgery. It is labeled CVE-2021-30004 (https://security.archlinux.org/CVE-2021-30004) and fixed by applying https://w1.fi/cgit/hostap/commit/?id=a0541334a6394f8237a4393b7372693cd7e96f15