ghsa-cwq5-xwx7-85wm
Vulnerability from github
Published
2024-09-06 06:31
Modified
2024-09-10 12:30
Details
tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.
{ "affected": [], "aliases": [ "CVE-2024-45751" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-06T05:15:13Z", "severity": null }, "details": "tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.", "id": "GHSA-cwq5-xwx7-85wm", "modified": "2024-09-10T12:30:35Z", "published": "2024-09-06T06:31:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45751" }, { "type": "WEB", "url": "https://github.com/fujita/tgt/pull/67" }, { "type": "WEB", "url": "https://github.com/fujita/tgt/compare/v1.0.92...v1.0.93" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2024/09/07/2" } ], "schema_version": "1.4.0", "severity": [] }
Loading...