Insufficient Buffer-Length Checks in rand_core Crate Lead to Inadequate Seeding of Random Number Generator
CVE-2021-27378 · CRITICAL Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
Learn more about our Web Application Penetration Testing UK.