First published: Thu Feb 11 2021(Updated: )
It was discovered that wpa_supplicant did not properly handle P2P (Wi-Fi Direct) group information in some situations, leading to a heap overflow. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-0326) It was discovered that hostapd did not properly handle UPnP subscribe messages in some circumstances. An attacker could use this to cause a denial of service. (CVE-2020-12695)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/hostapd | <2:2.9-1ubuntu8.1 | 2:2.9-1ubuntu8.1 |
=20.10 | ||
All of | ||
ubuntu/wpasupplicant | <2:2.9-1ubuntu8.1 | 2:2.9-1ubuntu8.1 |
=20.10 | ||
All of | ||
ubuntu/hostapd | <2:2.9-1ubuntu4.2 | 2:2.9-1ubuntu4.2 |
=20.04 | ||
All of | ||
ubuntu/wpasupplicant | <2:2.9-1ubuntu4.2 | 2:2.9-1ubuntu4.2 |
=20.04 | ||
All of | ||
ubuntu/hostapd | <2:2.6-15ubuntu2.7 | 2:2.6-15ubuntu2.7 |
=18.04 | ||
All of | ||
ubuntu/wpasupplicant | <2:2.6-15ubuntu2.7 | 2:2.6-15ubuntu2.7 |
=18.04 | ||
All of | ||
ubuntu/hostapd | <1:2.4-0ubuntu6.7 | 1:2.4-0ubuntu6.7 |
=16.04 | ||
All of | ||
ubuntu/wpasupplicant | <2.4-0ubuntu6.7 | 2.4-0ubuntu6.7 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-4734-1.
The wpa_supplicant and hostapd software is affected by this vulnerability.
The severity of CVE-2021-0326 is not mentioned in the advisory, but it can lead to a denial of service or possible arbitrary code execution.
To fix the vulnerability in hostapd package version 2:2.9-1ubuntu8.1, update it to version 2:2.9-1ubuntu8.1 by applying the provided remedy.
To fix the vulnerability in wpasupplicant package version 2:2.9-1ubuntu8.1, update it to version 2:2.9-1ubuntu8.1 by applying the provided remedy.