- Reported
-
- Issued
-
- Package
-
nanorand
(crates.io)
- Type
-
Vulnerability
- Categories
-
- Keywords
-
#rng
- Aliases
-
- References
-
- CVSS Score
- 5.1
MEDIUM
- CVSS Details
-
- Attack vector
- Local
- Attack complexity
- Low
- Privileges required
- None
- User interaction
- None
- Scope
- Unchanged
- Confidentiality
- Low
- Integrity
- Low
- Availability
- None
- CVSS Vector
- CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
- Patched
-
Description
In versions of nanorand
prior to 0.5.1, RandomGen
implementations for standard unsigned integers could
fail to properly generate numbers, due to using bit-shifting to truncate a 64-bit number, rather than just
an as
conversion.
This often manifested as RNGs returning nothing but 0, including the cryptographically secure ChaCha
random
number generator..
Advisory available under CC0-1.0
license.