USN-4734-1: wpa_supplicant and hostapd vulnerabilities
11 February 2021
Several security issues were fixed in wpa_supplicant and hostapd.
Releases
Packages
- wpa - client support for WPA and WPA2
Details
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)
It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-4734-2: hostapd, wpasupplicant, wpasupplicant-udeb, wpa, wpagui
- USN-4494-1: libgupnp-doc, gupnp, libgupnp-1.2-dev, libgupnp-1.2-0, gir1.2-gupnp-1.2
- USN-4722-1: minidlna