Ubuntu 6613 Published by

A wpa_supplicant and hostapd security update has been released for Ubuntu Linux 16.04 LTS, 18.04 LTS, 20.04 LTS, and 20.10.



USN-4734-1: wpa_supplicant and hostapd vulnerabilities


=========================================================================
Ubuntu Security Notice USN-4734-1
February 11, 2021

wpa vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in wpa_supplicant and hostapd.

Software Description:
- wpa: client support for WPA and WPA2

Details:

It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
hostapd 2:2.9-1ubuntu8.1
wpasupplicant 2:2.9-1ubuntu8.1

Ubuntu 20.04 LTS:
hostapd 2:2.9-1ubuntu4.2
wpasupplicant 2:2.9-1ubuntu4.2

Ubuntu 18.04 LTS:
hostapd 2:2.6-15ubuntu2.7
wpasupplicant 2:2.6-15ubuntu2.7

Ubuntu 16.04 LTS:
hostapd 1:2.4-0ubuntu6.7
wpasupplicant 2.4-0ubuntu6.7

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://usn.ubuntu.com/4734-1
CVE-2020-12695, CVE-2021-0326

Package Information:
  https://launchpad.net/ubuntu/+source/wpa/2:2.9-1ubuntu8.1
  https://launchpad.net/ubuntu/+source/wpa/2:2.9-1ubuntu4.2
  https://launchpad.net/ubuntu/+source/wpa/2:2.6-15ubuntu2.7
  https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.7