]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
P2P2: Check PASN PMKSA being available to prevent crash during invitation
authorShivani Baranwal <shivbara@qti.qualcomm.com>
Tue, 19 Aug 2025 08:20:11 +0000 (13:50 +0530)
committerJouni Malinen <j@w1.fi>
Thu, 4 Sep 2025 09:36:50 +0000 (12:36 +0300)
Add a NULL check for device PASN PMKSA in p2p_invitation_resp_cb(). This
is to ensure stability and prevent a crash in wpa_supplicant triggered
by a P2P invitation request that reinvokes an unknown group.

Fixes: ff02a87c1931 ("P2P2: Fetch PMK and PMKID for invitation using pairing verification")
Signed-off-by: Shivani Baranwal <shivbara@qti.qualcomm.com>
src/p2p/p2p_invitation.c

index 6d112ee87b290217a2ae3a1a502c7cb7e32839b6..3dd0b996308dcbb943e0600ffc68544b2dba8674 100644 (file)
@@ -774,7 +774,7 @@ void p2p_invitation_resp_cb(struct p2p_data *p2p, const u8 *peer, int success)
        struct p2p_device *dev;
 
        dev = p2p_get_device(p2p, peer);
-       if (dev && dev->pasn) {
+       if (dev && dev->pasn && dev->pasn->pmksa) {
                pasn_responder_pmksa_cache_get(dev->pasn->pmksa,
                                               dev->pasn->peer_addr, _pmkid,
                                               _pmk, &pmk_len);