CVE-2019-10064

Source
https://cve.org/CVERecord?id=CVE-2019-10064
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10064.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-10064
Downstream
Published
2020-02-28T15:15:11.993Z
Modified
2026-02-10T16:33:01.853324Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

References

Affected packages

Git / git.w1.fi/cgit/hostap

Affected ranges

Type
GIT
Repo
https://git.w1.fi/cgit/hostap
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
98a516eae8260e6fd5c48ddecf8d006285da7389

Affected versions

Other
aosp-jb-start
aosp-kk-from-upstream
hostap-1-bp
hostap_0_6_3
hostap_0_6_4
hostap_0_6_5
hostap_0_6_6
hostap_0_6_7
hostap_0_7_0
hostap_0_7_1
hostap_0_7_2
hostap_2_0
hostap_2_1
hostap_2_2
hostap_2_3
hostap_2_4
hostap_2_5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10064.json"