Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-27378 (GCVE-0-2021-27378)
Vulnerability from cvelistv5 – Published: 2021-02-18 03:35 – Updated: 2024-08-03 20:48- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:48:16.403Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-18T03:35:07.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-27378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html",
"refsource": "MISC",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-27378",
"datePublished": "2021-02-18T03:35:07.000Z",
"dateReserved": "2021-02-18T00:00:00.000Z",
"dateUpdated": "2024-08-03T20:48:16.403Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-27378",
"date": "2026-04-15",
"epss": "0.00468",
"percentile": "0.6454"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-27378\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-02-18T04:15:11.823\",\"lastModified\":\"2024-11-21T05:57:52.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en la crate rand_core versiones anteriores a 0.6.2 para Rust.\u0026#xa0;Debido a que las funciones read_u32_into y read_u64_into manejan inapropiadamente determinadas comprobaciones de la longitud del b\u00fafer, un generador de n\u00fameros aleatorios puede ser sembrado con muy pocos datos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-131\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rand_core_project:rand_core:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"0.6.0\",\"versionEndExcluding\":\"0.6.2\",\"matchCriteriaId\":\"76C21C9D-DDFF-4143-B2FB-8C5869812D61\"}]}]}],\"references\":[{\"url\":\"https://rustsec.org/advisories/RUSTSEC-2021-0023.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rustsec.org/advisories/RUSTSEC-2021-0023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GHSA-W7J2-35MF-95P7
Vulnerability from github – Published: 2021-08-25 20:52 – Updated: 2022-07-13 20:03An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers.
Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "rand_core"
},
"ranges": [
{
"events": [
{
"introduced": "0.6.0"
},
{
"fixed": "0.6.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-27378"
],
"database_specific": {
"cwe_ids": [
"CWE-330"
],
"github_reviewed": true,
"github_reviewed_at": "2021-08-19T17:35:01Z",
"nvd_published_at": "2021-02-18T04:15:00Z",
"severity": "CRITICAL"
},
"details": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because `read_u32_into` and `read_u64_into` mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn\u0027t apply to earlier minor version numbers.\n\nBecause read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.",
"id": "GHSA-w7j2-35mf-95p7",
"modified": "2022-07-13T20:03:17Z",
"published": "2021-08-25T20:52:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27378"
},
{
"type": "WEB",
"url": "https://github.com/rust-random/rand/pull/1096"
},
{
"type": "PACKAGE",
"url": "https://github.com/rust-random/rand"
},
{
"type": "WEB",
"url": "https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R19"
},
{
"type": "WEB",
"url": "https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R28"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Incorrect check on buffer length in rand_core"
}
OPENSUSE-SU-2024:11751-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "afterburn-5.0.0-6.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the afterburn-5.0.0-6.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11751",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11751-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35905 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36465 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32714 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45710 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45710/"
}
],
"title": "afterburn-5.0.0-6.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11751-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.aarch64",
"product": {
"name": "afterburn-5.0.0-6.1.aarch64",
"product_id": "afterburn-5.0.0-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.aarch64",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.aarch64",
"product_id": "afterburn-dracut-5.0.0-6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.ppc64le",
"product": {
"name": "afterburn-5.0.0-6.1.ppc64le",
"product_id": "afterburn-5.0.0-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.ppc64le",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.ppc64le",
"product_id": "afterburn-dracut-5.0.0-6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.s390x",
"product": {
"name": "afterburn-5.0.0-6.1.s390x",
"product_id": "afterburn-5.0.0-6.1.s390x"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.s390x",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.s390x",
"product_id": "afterburn-dracut-5.0.0-6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.x86_64",
"product": {
"name": "afterburn-5.0.0-6.1.x86_64",
"product_id": "afterburn-5.0.0-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.x86_64",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.x86_64",
"product_id": "afterburn-dracut-5.0.0-6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64"
},
"product_reference": "afterburn-5.0.0-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le"
},
"product_reference": "afterburn-5.0.0-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x"
},
"product_reference": "afterburn-5.0.0-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64"
},
"product_reference": "afterburn-5.0.0-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-35905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35905"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the futures-util crate before 0.3.7 for Rust. MutexGuard::map can cause a data race for certain closure situations (in safe code).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35905",
"url": "https://www.suse.com/security/cve/CVE-2020-35905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-35905"
},
{
"cve": "CVE-2020-36465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36465"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36465",
"url": "https://www.suse.com/security/cve/CVE-2020-36465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-36465"
},
{
"cve": "CVE-2021-27378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27378"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27378",
"url": "https://www.suse.com/security/cve/CVE-2021-27378"
},
{
"category": "external",
"summary": "SUSE Bug 1182432 for CVE-2021-27378",
"url": "https://bugzilla.suse.com/1182432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2021-27378"
},
{
"cve": "CVE-2021-32714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32714"
}
],
"notes": [
{
"category": "general",
"text": "hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper\u0027s HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in \"request smuggling\" or \"desync attacks.\" The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32714",
"url": "https://www.suse.com/security/cve/CVE-2021-32714"
},
{
"category": "external",
"summary": "SUSE Bug 1188174 for CVE-2021-32714",
"url": "https://bugzilla.suse.com/1188174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-32714"
},
{
"cve": "CVE-2021-32715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32715"
}
],
"notes": [
{
"category": "general",
"text": "hyper is an HTTP library for rust. hyper\u0027s HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn\u0027t parse such `Content-Length` headers, but forwards them, can result in \"request smuggling\" or \"desync attacks\". The flaw exists in all prior versions of hyper prior to 0.14.10, if built with `rustc` v1.5.0 or newer. The vulnerability is patched in hyper version 0.14.10. Two workarounds exist: One may reject requests manually that contain a plus sign prefix in the `Content-Length` header or ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32715",
"url": "https://www.suse.com/security/cve/CVE-2021-32715"
},
{
"category": "external",
"summary": "SUSE Bug 1188173 for CVE-2021-32715",
"url": "https://bugzilla.suse.com/1188173"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-32715"
},
{
"cve": "CVE-2021-38191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38191"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38191",
"url": "https://www.suse.com/security/cve/CVE-2021-38191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-38191"
},
{
"cve": "CVE-2021-45710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45710",
"url": "https://www.suse.com/security/cve/CVE-2021-45710"
},
{
"category": "external",
"summary": "SUSE Bug 1194119 for CVE-2021-45710",
"url": "https://bugzilla.suse.com/1194119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-45710"
}
]
}
GSD-2021-27378
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-27378",
"description": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.",
"id": "GSD-2021-27378",
"references": [
"https://www.suse.com/security/cve/CVE-2021-27378.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-27378"
],
"details": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.",
"id": "GSD-2021-27378",
"modified": "2023-12-13T01:23:35.998301Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-27378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html",
"refsource": "MISC",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rand_core_project:rand_core:*:*:*:*:*:rust:*:*",
"cpe_name": [],
"versionEndExcluding": "0.6.2",
"versionStartIncluding": "0.6.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-27378"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-02-25T22:30Z",
"publishedDate": "2021-02-18T04:15Z"
}
}
}
FKIE_CVE-2021-27378
Vulnerability from fkie_nvd - Published: 2021-02-18 04:15 - Updated: 2024-11-21 05:57| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://rustsec.org/advisories/RUSTSEC-2021-0023.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rustsec.org/advisories/RUSTSEC-2021-0023.html | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| rand_core_project | rand_core | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rand_core_project:rand_core:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "76C21C9D-DDFF-4143-B2FB-8C5869812D61",
"versionEndExcluding": "0.6.2",
"versionStartIncluding": "0.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la crate rand_core versiones anteriores a 0.6.2 para Rust.\u0026#xa0;Debido a que las funciones read_u32_into y read_u64_into manejan inapropiadamente determinadas comprobaciones de la longitud del b\u00fafer, un generador de n\u00fameros aleatorios puede ser sembrado con muy pocos datos"
}
],
"id": "CVE-2021-27378",
"lastModified": "2024-11-21T05:57:52.450",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-02-18T04:15:11.823",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-131"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
MSRC_CVE-2021-27378
Vulnerability from csaf_microsoft - Published: 2021-02-02 00:00 - Updated: 2026-02-18 14:32| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-27378 An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks a random number generator may be seeded with too little data. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-27378.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks a random number generator may be seeded with too little data.",
"tracking": {
"current_release_date": "2026-02-18T14:32:42.000Z",
"generator": {
"date": "2026-02-21T04:44:04.677Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-27378",
"initial_release_date": "2021-02-02T00:00:00.000Z",
"revision_history": [
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T14:32:42.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 librsvg2 2.50.3-4",
"product": {
"name": "\u003cazl3 librsvg2 2.50.3-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 librsvg2 2.50.3-4",
"product": {
"name": "azl3 librsvg2 2.50.3-4",
"product_id": "19743"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 librsvg2 2.58.1-1",
"product": {
"name": "\u003cazl3 librsvg2 2.58.1-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 librsvg2 2.58.1-1",
"product": {
"name": "azl3 librsvg2 2.58.1-1",
"product_id": "18817"
}
}
],
"category": "product_name",
"name": "librsvg2"
},
{
"category": "product_name",
"name": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "azl3 python-tensorboard 2.16.2-6",
"product_id": "2"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 librsvg2 2.50.3-4 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 librsvg2 2.50.3-4 as a component of Azure Linux 3.0",
"product_id": "19743-17084"
},
"product_reference": "19743",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 librsvg2 2.58.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 librsvg2 2.58.1-1 as a component of Azure Linux 3.0",
"product_id": "18817-17084"
},
"product_reference": "18817",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-27378",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-2"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19743-17084",
"18817-17084"
],
"known_affected": [
"17084-1",
"17084-3"
],
"known_not_affected": [
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-27378 An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks a random number generator may be seeded with too little data. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-27378.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-30T07:00:00.000Z",
"details": "2.58.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17084-1",
"17084-3"
]
}
],
"title": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks a random number generator may be seeded with too little data."
}
]
}
rustsec-2021-0023
Vulnerability from osv_rustsec
Summary: rand_core::le::read_u32_into and read_u64_into have incorrect checks on the source buffer length, allowing the destination buffer to be under-filled.
Implications: some downstream RNGs, including Hc128Rng (but not the more widely used ChaCha*Rng), allow seeding using the SeedableRng::from_seed trait-function with too short keys.
{
"affected": [
{
"database_specific": {
"categories": [
"crypto-failure"
],
"cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [
"rand_core::le::read_u32_into",
"rand_core::le::read_u64_into"
],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "rand_core",
"purl": "pkg:cargo/rand_core"
},
"ranges": [
{
"events": [
{
"introduced": "0.6.0"
},
{
"fixed": "0.6.2"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2021-27378",
"GHSA-w7j2-35mf-95p7"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "Summary: rand_core::le::read_u32_into and read_u64_into have incorrect checks on the source buffer length, allowing the destination buffer to be under-filled.\n\nImplications: some downstream RNGs, including Hc128Rng (but not the more widely used ChaCha*Rng), allow seeding using the SeedableRng::from_seed trait-function with too short keys.",
"id": "RUSTSEC-2021-0023",
"modified": "2023-06-13T13:10:24Z",
"published": "2021-02-12T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/rand_core"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0023.html"
},
{
"type": "WEB",
"url": "https://github.com/rust-random/rand/pull/1096"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Incorrect check on buffer length when seeding RNGs"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.