Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Apr 2016 13:27:34 -0600
From: Kurt Seifried <>
To: oss-security <>, CVE ID Requests <>
Subject: CVE for nodejs node-uuid

Insecure Entropy Source - Math.random()

March 28th, 2016
CVE-PENDING • Credit: Fedot Praslov
Vulnerable: <1.4.4
Patched: >=1.4.4

node-uuid prior to 1.4.4 contained a bug that caused it to consistently
fall back to using Math.random instead of a more cryptographically sound
source of entropy, the native crypto module.


Upgrade to version 1.4.4 or greater


Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact:

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ