First published: Mon Aug 20 2018(Updated: )
It was discovered that wpa_supplicant and hostapd incorrectly handled certain messages. An attacker could possibly use this to access sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/hostapd | <2:2.6-15ubuntu2.1 | 2:2.6-15ubuntu2.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/wpasupplicant | <2:2.6-15ubuntu2.1 | 2:2.6-15ubuntu2.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/hostapd | <1:2.4-0ubuntu6.3 | 1:2.4-0ubuntu6.3 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/wpasupplicant | <2.4-0ubuntu6.3 | 2.4-0ubuntu6.3 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/hostapd | <1:2.1-0ubuntu1.6 | 1:2.1-0ubuntu1.6 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/wpasupplicant | <2.1-0ubuntu1.6 | 2.1-0ubuntu1.6 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is USN-3745-1.
The affected software includes wpa_supplicant and hostapd.
The severity level of this vulnerability has not been specified.
An attacker could exploit this vulnerability to access sensitive information.
To fix this vulnerability, update the affected software to the recommended versions provided by Ubuntu.