CVE-2019-10064

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-10064
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10064.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-10064
Related
Published
2020-02-28T15:15:11Z
Modified
2025-02-19T02:44:48.339702Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

References

Affected packages

Debian:11 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.6-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.6-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.6-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / w1.fi/cgit/hostap

Affected ranges

Type
GIT
Repo
https://w1.fi/cgit/hostap
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
98a516eae8260e6fd5c48ddecf8d006285da7389
Fixed
98a516eae8260e6fd5c48ddecf8d006285da7389

Affected versions

Other

aosp-jb-start
aosp-kk-from-upstream
hostap-1-bp
hostap_0_6_3
hostap_0_6_4
hostap_0_6_5
hostap_0_6_6
hostap_0_6_7
hostap_0_7_0
hostap_0_7_1
hostap_0_7_2
hostap_2_0
hostap_2_1
hostap_2_2
hostap_2_3
hostap_2_4
hostap_2_5