hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
References
Configurations
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html - | |
References | () http://seclists.org/fulldisclosure/2020/Feb/26 - | |
References | () http://www.openwall.com/lists/oss-security/2020/02/27/1 - | |
References | () http://www.openwall.com/lists/oss-security/2020/02/27/2 - | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00035.html - | |
References | () https://usn.ubuntu.com/3944-1/ - | |
References | () https://w1.fi/cgit/hostap/commit/?id=98a516eae8260e6fd5c48ddecf8d006285da7389 - Patch, Third Party Advisory |
Information
Published : 2019-03-23 19:29
Updated : 2024-11-21 02:44
NVD link : CVE-2016-10743
Mitre link : CVE-2016-10743
CVE.ORG link : CVE-2016-10743
JSON object : View
Products Affected
w1.fi
- hostapd
CWE
CWE-332
Insufficient Entropy in PRNG