An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
References
Link | Resource |
---|---|
https://rustsec.org/advisories/RUSTSEC-2021-0023.html | Third Party Advisory |
Configurations
Information
Published : 2021-02-17 20:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-27378
Mitre link : CVE-2021-27378
JSON object : View
CWE
CWE-131
Incorrect Calculation of Buffer Size
Products Affected
rand_core_project
- rand_core