cvelist/2024/45xxx/CVE-2024-45751.json

72 lines
2.2 KiB
JSON
Raw Normal View History

2024-09-06 05:00:34 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-45751",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/fujita/tgt/pull/67",
"refsource": "MISC",
"name": "https://github.com/fujita/tgt/pull/67"
},
{
"url": "https://github.com/fujita/tgt/compare/v1.0.92...v1.0.93",
"refsource": "MISC",
"name": "https://github.com/fujita/tgt/compare/v1.0.92...v1.0.93"
2024-09-10 12:00:34 +00:00
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2024/09/07/2",
"url": "https://www.openwall.com/lists/oss-security/2024/09/07/2"
2024-09-06 05:00:34 +00:00
}
]
}
}