CVE-2021-27378

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
References
Link Resource
https://rustsec.org/advisories/RUSTSEC-2021-0023.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rand_core_project:rand_core:*:*:*:*:*:rust:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-330 CWE-131

Information

Published : 2021-02-18 04:15

Updated : 2024-02-04 21:23


NVD link : CVE-2021-27378

Mitre link : CVE-2021-27378

CVE.ORG link : CVE-2021-27378


JSON object : View

Products Affected

rand_core_project

  • rand_core
CWE
CWE-131

Incorrect Calculation of Buffer Size