[USN-4734-1] wpa_supplicant and hostapd vulnerabilities

Steve Beattie steve.beattie at canonical.com
Thu Feb 11 22:25:34 UTC 2021

Ubuntu Security Notice USN-4734-1
February 11, 2021

wpa vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS


Several security issues were fixed in wpa_supplicant and hostapd.

Software Description:
- wpa: client support for WPA and WPA2


It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
  hostapd                         2:2.9-1ubuntu8.1
  wpasupplicant                   2:2.9-1ubuntu8.1

Ubuntu 20.04 LTS:
  hostapd                         2:2.9-1ubuntu4.2
  wpasupplicant                   2:2.9-1ubuntu4.2

Ubuntu 18.04 LTS:
  hostapd                         2:2.6-15ubuntu2.7
  wpasupplicant                   2:2.6-15ubuntu2.7

Ubuntu 16.04 LTS:
  hostapd                         1:2.4-0ubuntu6.7
  wpasupplicant                   2.4-0ubuntu6.7

After a standard system update you need to reboot your computer to make
all the necessary changes.

  CVE-2020-12695, CVE-2021-0326

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20210211/42635459/attachment.sig>

More information about the ubuntu-security-announce mailing list