USN-4734-2: wpa_supplicant and hostapd vulnerabilities
16 February 2021
Several security issues were fixed in wpa_supplicant and hostapd.
Releases
Packages
- wpa - client support for WPA and WPA2
Details
USN-4734-1 fixed several vulnerabilities in wpa_supplicant. This
update provides the corresponding update for Ubuntu 14.04 ESM.
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)
It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-4734-1: wpasupplicant, wpa, wpasupplicant-udeb, wpagui, hostapd
- USN-4494-1: gir1.2-gupnp-1.2, gupnp, libgupnp-1.2-0, libgupnp-doc, libgupnp-1.2-dev
- USN-4722-1: minidlna