Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXc3ajItMzVtZi05NXA3

Incorrect check on buffer length in rand_core

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers.

Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.

Permalink: https://github.com/advisories/GHSA-w7j2-35mf-95p7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXc3ajItMzVtZi05NXA3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 11 months ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-w7j2-35mf-95p7, CVE-2021-27378
References: Repository: https://github.com/rust-random/rand
Blast Radius: 47.7

Affected Packages

cargo:rand_core
Dependent packages: 925
Dependent repositories: 73,473
Downloads: 309,102,386 total
Affected Version Ranges: >= 0.6.0, < 0.6.2
Fixed in: 0.6.2
All affected versions: 0.6.0, 0.6.1
All unaffected versions: 0.0.1, 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.6.2, 0.6.3, 0.6.4