Executive Summary

Title wpa_supplicant and hostapd vulnerability
Name USN-4136-1 First vendor Publication 2019-09-18
Vendor Ubuntu Last vendor Modification 2019-09-18
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 3.3 Attack Range Adjacent network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS


wpa_supplicant could be made to be disconnected and require reconnection to the network if it received a specially crafted management frame.

Software Description: - wpa: client support for WPA and WPA2


It was discovered that wpa_supplicant incorrectly handled certain management frames. An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04:
hostapd 2:2.6-21ubuntu3.3
wpasupplicant 2:2.6-21ubuntu3.3

Ubuntu 18.04 LTS:
hostapd 2:2.6-15ubuntu2.5
wpasupplicant 2:2.6-15ubuntu2.5

Ubuntu 16.04 LTS:
hostapd 1:2.4-0ubuntu6.6
wpasupplicant 2.4-0ubuntu6.6

After a standard system update you need to reboot your computer to make all the necessary changes.


Package Information:

Original Source

Url : http://www.ubuntu.com/usn/USN-4136-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-346 Origin Validation Error

CPE : Common Platform Enumeration

Application 44
Application 40
Os 5
Os 2

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-09-18 17:22:11
  • Multiple Updates
2019-09-18 17:18:54
  • First insertion