First published: Wed Sep 18 2019(Updated: )
USN-4136-1 fixed a vulnerability in wpa_supplicant. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that wpa_supplicant incorrectly handled certain management frames. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/hostapd | <1:2.1-0ubuntu1.7+esm2 | 1:2.1-0ubuntu1.7+esm2 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/wpasupplicant | <2.1-0ubuntu1.7+esm2 | 2.1-0ubuntu1.7+esm2 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/wpasupplicant | <0.7.3-6ubuntu2.5 | 0.7.3-6ubuntu2.5 |
Ubuntu Linux | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this wpa_supplicant and hostapd vulnerability is USN-4136-2.
The affected software for this vulnerability includes wpa_supplicant and hostapd versions 2.1-0ubuntu1.7+esm2 and 0.7.3-6ubuntu2.5 on Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
The severity of the wpa_supplicant and hostapd vulnerability is not mentioned in the provided information. It is recommended to refer to the official references for more details.
To fix the wpa_supplicant and hostapd vulnerability, update to the latest available versions of wpa_supplicant and hostapd as recommended by the official references.
More information about the wpa_supplicant and hostapd vulnerability can be found in the official references: CVE-2019-16275, USN-4136-1, and the Launchpad page for wpa 2.1-0ubuntu1.7+esm2.