Описание
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 0.6.0 (включая) до 0.6.2 (исключая)
cpe:2.3:a:rand_core_project:rand_core:*:*:*:*:*:rust:*:*
EPSS
Процентиль: 64%
0.00468
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-131
Связанные уязвимости
CVSS3: 9.8
ubuntu
почти 5 лет назад
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
CVSS3: 9.8
debian
почти 5 лет назад
An issue was discovered in the rand_core crate before 0.6.2 for Rust. ...
EPSS
Процентиль: 64%
0.00468
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-131