USN-3969-2: wpa_supplicant and hostapd vulnerability
9 May 2019
wpa_supplicant and hostapd could be made to crash if they received specially crafted network traffic.
Releases
Packages
- wpa - client support for WPA and WPA2
Details
USN-3969-1 fixed a vulnerability in wpa_supplicant and hostapd. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that wpa_supplicant and hostapd incorrectly handled
unexpected fragments when using EAP-pwd. A remote attacker could possibly
use this issue to cause a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3969-1: wpasupplicant, wpa, wpasupplicant-udeb, hostapd, wpagui