First published: Sat Apr 20 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | <=2:2.4-1+deb9u2<=2:2.4-1<=2:2.4-1+deb9u3<=2:2.7+git20190128+0c1e29f-4 | 2:2.7+git20190128+0c1e29f-5 2:2.4-1+deb9u4 |
W1.fi Hostapd | <2.8 | |
W1.fi Wpa Supplicant | <2.8 | |
debian/wpa | 2:2.9.0-21+deb11u2 2:2.10-12+deb12u2 2:2.10-22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11555 is a vulnerability in the EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP peer) before version 2.8 that can result in process termination due to a NULL pointer dereference.
CVE-2019-11555 has a severity level keyword of 'high' and a severity value of 5.9.
The affected software versions include hostapd (EAP server) before version 2.8 and wpa_supplicant (EAP peer) before version 2.8.
To fix CVE-2019-11555, you should upgrade hostapd (EAP server) to version 2.8 or later and wpa_supplicant (EAP peer) to version 2.8 or later.
You can find more information about CVE-2019-11555 at the following references: [link1], [link2], [link3].