hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.
Link | Tags |
---|---|
https://w1.fi/cgit/hostap/commit/?id=98a516eae8260e6fd5c48ddecf8d006285da7389 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2019/03/msg00035.html | mailing list |
https://usn.ubuntu.com/3944-1/ | vendor advisory |
http://www.openwall.com/lists/oss-security/2020/02/27/1 | mailing list |
http://www.openwall.com/lists/oss-security/2020/02/27/2 | mailing list |
http://seclists.org/fulldisclosure/2020/Feb/26 | mailing list |
http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html |