hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Hostapd | W1.fi | * | 2.6 (excluding) |
Wpa | Ubuntu | trusty | * |
Wpa | Ubuntu | upstream | * |
Wpa | Ubuntu | xenial | * |