node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Link | Tags |
---|---|
https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d | patch |
https://nodesecurity.io/advisories/93 | third party advisory |
http://www.openwall.com/lists/oss-security/2016/04/13/8 | patch mailing list third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1327056 | patch third party advisory issue tracking |