An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
References
Link | Resource |
---|---|
https://rustsec.org/advisories/RUSTSEC-2021-0023.html | Third Party Advisory |
Configurations
History
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-131 |
Information
Published : 2021-02-18 04:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-27378
Mitre link : CVE-2021-27378
CVE.ORG link : CVE-2021-27378
JSON object : View
Products Affected
rand_core_project
- rand_core
CWE
CWE-131
Incorrect Calculation of Buffer Size