First published: Wed Sep 18 2019(Updated: )
It was discovered that wpa_supplicant incorrectly handled certain management frames. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/hostapd | <2:2.6-21ubuntu3.3 | 2:2.6-21ubuntu3.3 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/wpasupplicant | <2:2.6-21ubuntu3.3 | 2:2.6-21ubuntu3.3 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/hostapd | <2:2.6-15ubuntu2.5 | 2:2.6-15ubuntu2.5 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/wpasupplicant | <2:2.6-15ubuntu2.5 | 2:2.6-15ubuntu2.5 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/hostapd | <1:2.4-0ubuntu6.6 | 1:2.4-0ubuntu6.6 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/wpasupplicant | <2.4-0ubuntu6.6 | 2.4-0ubuntu6.6 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is USN-4136-1.
The software affected by this vulnerability is wpa_supplicant and hostapd.
The impact of this vulnerability is a denial of service.
An attacker can exploit this vulnerability by manipulating certain management frames.
To fix this vulnerability, update the affected software to version 2:2.6-21ubuntu3.3 or later.