ghsa-cwq5-xwx7-85wm
Vulnerability from github
Published
2024-09-06 06:31
Modified
2024-09-10 12:30
Details

tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2024-45751"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-09-06T05:15:13Z",
    "severity": null
  },
  "details": "tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.",
  "id": "GHSA-cwq5-xwx7-85wm",
  "modified": "2024-09-10T12:30:35Z",
  "published": "2024-09-06T06:31:41Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45751"
    },
    {
      "type": "WEB",
      "url": "https://github.com/fujita/tgt/pull/67"
    },
    {
      "type": "WEB",
      "url": "https://github.com/fujita/tgt/compare/v1.0.92...v1.0.93"
    },
    {
      "type": "WEB",
      "url": "https://www.openwall.com/lists/oss-security/2024/09/07/2"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...