First published: Mon Feb 01 2021(Updated: )
In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | <=2:2.7+git20190128+0c1e29f-6<=2:2.7+git20190128+0c1e29f-6+deb10u2<=2:2.9.0-16 | 2:2.9.0-17 2:2.7+git20190128+0c1e29f-6+deb10u3 |
Google Android | =8.1 | |
Google Android | =9.0 | |
Google Android | =10.0 | |
Google Android | =11.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/wpa | 2:2.9.0-21+deb11u2 2:2.10-12+deb12u2 2:2.10-22 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0326 is a vulnerability in the p2p_copy_client_info function of p2p.c that allows for a possible out of bounds write due to a missing bounds check.
The severity of CVE-2021-0326 is critical with a CVSSv3 score of 7.5.
The affected software versions include wpa 2:2.6-15ubuntu2.7, 2:2.9-1ubuntu4.2, 2:2.9-1ubuntu8.1, 2.1-0ubuntu1.7+, 2:2.9.0-17, and 2.4-0ubuntu6.7.
To fix CVE-2021-0326, update the affected software to the recommended versions: 2:2.6-15ubuntu2.7, 2:2.9-1ubuntu4.2, 2:2.9-1ubuntu8.1, 2.1-0ubuntu1.7+, 2:2.9.0-17, or 2.4-0ubuntu6.7.
No, user interaction is not needed for exploitation of CVE-2021-0326.