An issue was discovered in Ubuntu wpasupplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpasupplicant runs as (usually root).
Membership in the netdev group or access to the dbus interface of wpasupplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpasupplicant process; other escalation paths might exist.