ALAS2-2021-1648

Related Vulnerabilities: CVE-2021-0326  

In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525 (CVE-2021-0326)

ALAS2-2021-1648


Amazon Linux 2 Security Advisory: ALAS-2021-1648
Advisory Release Date: 2021-06-16 20:36 Pacific
Advisory Updated Date: 2021-06-22 21:38 Pacific
Severity: Medium
References: CVE-2021-0326 

Issue Overview:

In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525 (CVE-2021-0326)


Affected Packages:

wpa_supplicant


Issue Correction:
Run yum update wpa_supplicant to update your system.

New Packages:
aarch64:
    wpa_supplicant-2.6-12.amzn2.2.2.aarch64
    wpa_supplicant-debuginfo-2.6-12.amzn2.2.2.aarch64

i686:
    wpa_supplicant-2.6-12.amzn2.2.2.i686
    wpa_supplicant-debuginfo-2.6-12.amzn2.2.2.i686

src:
    wpa_supplicant-2.6-12.amzn2.2.2.src

x86_64:
    wpa_supplicant-2.6-12.amzn2.2.2.x86_64
    wpa_supplicant-debuginfo-2.6-12.amzn2.2.2.x86_64