Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Apr 2016 13:27:34 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security <oss-security@...ts.openwall.com>, CVE ID Requests <cve-assign@...re.org>
Subject: CVE for nodejs node-uuid

https://nodesecurity.io/advisories/93

Insecure Entropy Source - Math.random()

March 28th, 2016
CVE-PENDING • Credit: Fedot Praslov
node-uuid
Vulnerable: <1.4.4
Patched: >=1.4.4
Overview

node-uuid prior to 1.4.4 contained a bug that caused it to consistently
fall back to using Math.random instead of a more cryptographically sound
source of entropy, the native crypto module.

Remediation

Upgrade to version 1.4.4 or greater

References

https://github.com/broofa/node-uuid/issues/108
https://github.com/broofa/node-uuid/issues/122


--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ