Description
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1910 | An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data. |
Github GHSA |
GHSA-w7j2-35mf-95p7 | Incorrect check on buffer length in rand_core |
References
| Link | Providers |
|---|---|
| https://rustsec.org/advisories/RUSTSEC-2021-0023.html |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:48:16.403Z
Reserved: 2021-02-18T00:00:00.000Z
Link: CVE-2021-27378
No data.
Status : Modified
Published: 2021-02-18T04:15:11.823
Modified: 2024-11-21T05:57:52.450
Link: CVE-2021-27378
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA