You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- fixed: 1.53.3
packages:
- package: github.com/rclone/rclone
description: 'An issue was discovered in Rclone before 1.53.3. Due to the use of a
weak random number generator, the password generator has been producing weak passwords
with much less entropy than advertised. The suggested passwords depend deterministically
on the time the second rclone was started. This limits the entropy of the passwords
enormously. These passwords are often used in the crypt backend for encryption
of data. It would be possible to make a dictionary of all possible passwords with
about 38 million entries per password length. This would make decryption of secret
material possible with a plausible amount of effort. NOTE: all passwords generated
by affected versions should be changed.'
cves:
- CVE-2020-28924
ghsas:
- GHSA-rmw5-xpg9-jr29
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-rmw5-xpg9-jr29, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: