Your submission was sent successfully! Close

USN-4734-2: wpa_supplicant and hostapd vulnerabilities

16 February 2021

Several security issues were fixed in wpa_supplicant and hostapd.



  • wpa - client support for WPA and WPA2


USN-4734-1 fixed several vulnerabilities in wpa_supplicant. This
update provides the corresponding update for Ubuntu 14.04 ESM.

It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-4734-1: wpasupplicant, wpagui, wpa, wpasupplicant-udeb, hostapd
  • USN-4494-1: gupnp, libgupnp-1.2-0, libgupnp-doc, gir1.2-gupnp-1.2, libgupnp-1.2-dev
  • USN-4722-1: minidlna