PUB-A-262235935

See a problem?
Import Source
https://storage.googleapis.com/android-osv/PUB-A-262235935.json
JSON Data
https://api.osv.dev/v1/vulns/PUB-A-262235935
Aliases
  • A-262235935
  • CVE-2023-20968
Published
2023-06-01T00:00:00Z
Modified
2024-11-06T12:16:03.231308Z
Summary
[none]
Details

In multiple functions of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.

References

Affected packages

Android / platform/external/wpa_supplicant_8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
13-next:0
Fixed
13-next:2023-06-01

Affected versions

Other

13-next

Ecosystem specific

{
    "vanir_signatures": [
        {
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "228066257970812311635731777211166196658",
                    "100752120684113076299847136915687889189",
                    "273993613501080822528871467093519953898",
                    "234926275968339717606777172725827074758",
                    "61304571041197757629490486157462941585",
                    "100752120684113076299847136915687889189",
                    "273993613501080822528871467093519953898",
                    "234926275968339717606777172725827074758"
                ]
            },
            "id": "PUB-A-262235935-6be39ac8",
            "source": "https://android.googlesource.com/platform/external/wpa_supplicant_8/+/142f4c37b2faea8a751d487e485135cf15b16706",
            "deprecated": false,
            "signature_version": "v1",
            "target": {
                "file": "wpa_supplicant/aidl/p2p_iface.cpp"
            },
            "signature_type": "Line"
        },
        {
            "match_only_versions": [
                "13-next"
            ],
            "digest": {
                "length": 416.0,
                "function_hash": "214240181816500263952705582903897011179"
            },
            "id": "PUB-A-262235935-778ab2a2",
            "source": "https://android.googlesource.com/platform/external/wpa_supplicant_8/+/142f4c37b2faea8a751d487e485135cf15b16706",
            "deprecated": false,
            "signature_version": "v1",
            "target": {
                "file": "wpa_supplicant/aidl/p2p_iface.cpp",
                "function": "P2pIface::getGroupCapabilityInternal"
            },
            "signature_type": "Function"
        },
        {
            "match_only_versions": [
                "13-next"
            ],
            "digest": {
                "length": 614.0,
                "function_hash": "221769818525474882771776081602871643898"
            },
            "id": "PUB-A-262235935-eaaeeb71",
            "source": "https://android.googlesource.com/platform/external/wpa_supplicant_8/+/142f4c37b2faea8a751d487e485135cf15b16706",
            "deprecated": false,
            "signature_version": "v1",
            "target": {
                "file": "wpa_supplicant/aidl/p2p_iface.cpp",
                "function": "P2pIface::getSsidInternal"
            },
            "signature_type": "Function"
        }
    ],
    "fixes": [
        "https://android.googlesource.com/platform/external/wpa_supplicant_8/+/142f4c37b2faea8a751d487e485135cf15b16706"
    ],
    "spl": "2023-06-01",
    "severity": "Moderate",
    "types": [
        "ID"
    ]
}