An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1910 | An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data. |
Github GHSA |
GHSA-w7j2-35mf-95p7 | Incorrect check on buffer length in rand_core |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://rustsec.org/advisories/RUSTSEC-2021-0023.html |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:48:16.403Z
Reserved: 2021-02-18T00:00:00
Link: CVE-2021-27378
No data.
Status : Modified
Published: 2021-02-18T04:15:11.823
Modified: 2024-11-21T05:57:52.450
Link: CVE-2021-27378
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA