Insufficient Buffer-Length Checks in rand_core Crate Lead to Inadequate Seeding of Random Number Generator

Insufficient Buffer-Length Checks in rand_core Crate Lead to Inadequate Seeding of Random Number Generator

CVE-2021-27378 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.

Learn more about our Web Application Penetration Testing UK.