Headline
GHSA-3fmq-x9q6-wm39: random_compat Uses insecure CSPRNG
random_compat versions prior to 2.0 are affected by a security vulnerability related to the insecure usage of Cryptographically Secure Pseudo-Random Number Generators (CSPRNG). The affected versions use openssl_random_pseudo_bytes(), which may result in insufficient entropy and compromise the security of generated random numbers.
random_compat Uses insecure CSPRNG
Low severity GitHub Reviewed Published May 17, 2024 to the GitHub Advisory Database • Updated May 17, 2024