logo

CVE-2020-35926 nanorand

Package

Manager: cargo
Name: nanorand
Vulnerable Version: >=0 <0.5.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00433 pctl0.61951

Details

Improper random number generation in nanorand In versions of nanorand prior to 0.5.1, RandomGen implementations for standard unsigned integers could fail to properly generate numbers, due to using bit-shifting to truncate a 64-bit number, rather than just an as conversion. This often manifested as RNGs returning nothing but 0, including the cryptographically secure ChaCha random number generator.

Metadata

Created: 2021-08-25T20:50:24Z
Modified: 2023-06-13T20:01:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-m9m5-cg5h-r582/GHSA-m9m5-cg5h-r582.json
CWE IDs: ["CWE-338"]
Alternative ID: GHSA-m9m5-cg5h-r582
Finding: F034
Auto approve: 1