USN-3969-1: wpa_supplicant and hostapd vulnerability
7 May 2019
wpa_supplicant and hostapd could be made to crash if they received specially crafted network traffic.
- wpa - client support for WPA and WPA2
It was discovered that wpa_supplicant and hostapd incorrectly handled
unexpected fragments when using EAP-pwd. A remote attacker could possibly
use this issue to cause a denial of service.
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to reboot your computer to make
all the necessary changes.
- USN-3969-2: wpasupplicant, wpa, wpasupplicant-udeb, wpagui, hostapd