CVE-2021-27378

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
References
Link Resource
https://rustsec.org/advisories/RUSTSEC-2021-0023.html Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:rand_core_project:rand_core:*:*:*:*:*:rust:*:*

Information

Published : 2021-02-18 04:15

Updated : 2022-07-12 05:42


NVD link : CVE-2021-27378

Mitre link : CVE-2021-27378

Products Affected
No products.
CWE
CWE-131

Incorrect Calculation of Buffer Size