Updated wpa_suppliant packages fix security vulnerabilities:
A vulnerability was found in how wpasupplicant writes the configuration file update for the WPA/WPA2 passphrase parameter. If this parameter has been updated to include control characters either through a WPS operation (CVE-2016-4476) or through local configuration change over the wpasupplicant control interface (CVE-2016-4477), the resulting configuration file may prevent the wpasupplicant from starting when the updated file is used. In addition, it may be possible to load a local library file and execute code from there with the same privileges under which the wpasupplicant process runs.