{"id":"CVE-2021-27378","details":"An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.","aliases":["GHSA-w7j2-35mf-95p7","RUSTSEC-2021-0023"],"modified":"2026-03-14T10:49:51.899841Z","published":"2021-02-18T04:15:11.823Z","related":["openSUSE-SU-2024:11751-1"],"references":[{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2021-0023.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rust-random/rand","events":[{"introduced":"98e220c30234370fb04ba928799ebd9727fc049a"},{"fixed":"3a03c9eb5350e03a3f540dba2ee34e0984f2c2c2"}],"database_specific":{"versions":[{"introduced":"0.6.0"},{"fixed":"0.6.2"}]}}],"versions":["0.8.0","0.8.1","0.8.2","0.8.3","rand_chacha-0.3.0","rand_core-0.6.0","rand_core-0.6.1","rand_distr-0.4.0","rand_hc-0.3.0","rand_pcg-0.3.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-27378.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}