First published: Wed Aug 07 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W1.fi Hostapd | >=2.0<=2.8 | |
Fedoraproject Fedora | =30 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =10.0 | |
debian/wpa | <=2:2.7+git20190128+0c1e29f-6<=2:2.8-3 | 2:2.9-1 2:2.7+git20190128+0c1e29f-6+deb10u1 |
debian/wpa | 2:2.9.0-21+deb11u2 2:2.10-12+deb12u2 2:2.10-22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13377 is a vulnerability in the implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8.
CVE-2019-13377 has a severity rating of 5.9 (medium).
The affected software includes hostapd and wpa_supplicant 2.x through 2.8, W1.fi Hostapd, Fedora 30, Canonical Ubuntu Linux 18.04, Canonical Ubuntu Linux 19.04, and Debian Debian Linux 10.0.
To fix CVE-2019-13377, update the affected software to the recommended versions: wpa 2:2.9-1 or 2:2.7+git20190128+0c1e29f-6+deb10u1 for Debian, wpa 2:2.6-15ubuntu2.4 for Ubuntu Bionic, wpa 2:2.6-21ubuntu3.2 for Ubuntu Disco.
You can find more information about CVE-2019-13377 on the Debian Security Tracker, MITRE CVE database, and the official W1.fi security advisory.