Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXc3ajItMzVtZi05NXA3
Incorrect check on buffer length in rand_core
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into
and read_u64_into
mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers.
Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
Permalink: https://github.com/advisories/GHSA-w7j2-35mf-95p7JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXc3ajItMzVtZi05NXA3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-w7j2-35mf-95p7, CVE-2021-27378
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-27378
- https://github.com/rust-random/rand/pull/1096
- https://rustsec.org/advisories/RUSTSEC-2021-0023.html
- https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R19
- https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R28
- https://github.com/advisories/GHSA-w7j2-35mf-95p7
Blast Radius: 47.7
Affected Packages
cargo:rand_core
Dependent packages: 925Dependent repositories: 73,473
Downloads: 309,102,386 total
Affected Version Ranges: >= 0.6.0, < 0.6.2
Fixed in: 0.6.2
All affected versions: 0.6.0, 0.6.1
All unaffected versions: 0.0.1, 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.6.2, 0.6.3, 0.6.4