An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into
and read_u64_into
mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers.
Because readu32into and readu64into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
{ "nvd_published_at": "2021-02-18T04:15:00Z", "cwe_ids": [ "CWE-330" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-08-19T17:35:01Z" }