Ubuntu Security Notice USN-4734-1 ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on February 12th, 2021 📆 | 7772 Views ⚑

0

Ubuntu Security Notice USN-4734-1 ≈ Packet Storm

=========================================================================
Ubuntu Security Notice USN-4734-1
February 11, 2021

wpa vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.10
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in wpa_supplicant and hostapd.

Software Description:
– wpa: client support for WPA and WPA2

Details:

It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
hostapd 2:2.9-1ubuntu8.1
wpasupplicant 2:2.9-1ubuntu8.1

Ubuntu 20.04 LTS:
hostapd 2:2.9-1ubuntu4.2
wpasupplicant 2:2.9-1ubuntu4.2

Ubuntu 18.04 LTS:
hostapd 2:2.6-15ubuntu2.7
wpasupplicant 2:2.6-15ubuntu2.7

Ubuntu 16.04 LTS:
hostapd 1:2.4-0ubuntu6.7
wpasupplicant 2.4-0ubuntu6.7

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/4734-1
CVE-2020-12695, CVE-2021-0326

Package Information:
https://launchpad.net/ubuntu/+source/wpa/2:2.9-1ubuntu8.1
https://launchpad.net/ubuntu/+source/wpa/2:2.9-1ubuntu4.2
https://launchpad.net/ubuntu/+source/wpa/2:2.6-15ubuntu2.7
https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.7

Source link

Tagged with:



Leave a Reply