Your submission was sent successfully! Close

USN-4734-1: wpa_supplicant and hostapd vulnerabilities

11 February 2021

Several security issues were fixed in wpa_supplicant and hostapd.



  • wpa - client support for WPA and WPA2


It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-4734-2: hostapd, wpa, wpasupplicant, wpagui, wpasupplicant-udeb
  • USN-4494-1: libgupnp-1.2-0, libgupnp-doc, gir1.2-gupnp-1.2, libgupnp-1.2-dev, gupnp
  • USN-4722-1: minidlna