USN-3969-1: wpa_supplicant and hostapd vulnerability
7 May 2019
wpa_supplicant and hostapd could be made to crash if they received specially crafted network traffic.
Releases
Packages
- wpa - client support for WPA and WPA2
Details
It was discovered that wpa_supplicant and hostapd incorrectly handled
unexpected fragments when using EAP-pwd. A remote attacker could possibly
use this issue to cause a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
Ubuntu 18.10
Ubuntu 18.04
Ubuntu 16.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3969-2: wpasupplicant, wpasupplicant-udeb, hostapd, wpagui, wpa