Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-27378

Опубликовано: 18 фев. 2021
Источник: debian

Описание

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rust-rand-corenot-affectedpackage

Примечания

  • https://rustsec.org/advisories/RUSTSEC-2021-0023.html

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 5 лет назад

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.

CVSS3: 9.8
nvd
почти 5 лет назад

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.

CVSS3: 9.8
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 9.8
github
больше 4 лет назад

Incorrect check on buffer length in rand_core