Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Bump minimum version of rand_core to address RUSTSEC-2021-0023
``` error[A001]: Incorrect check on buffer length when seeding RNGs ββ /home/lopopolo/dev/artichoke/rand_mt/Cargo.lock:13:1 β 13 β rand_core 0.6.1 registry+https://github.com/rust-lang/crates.io-index β --------------------------------------------------------------------- security vulnerability detected β = ID: RUSTSEC-2021-0023 = Advisory: https://rustsec.org/advisories/RUSTSEC-2021-0023 = Summary: rand_core::le::read_u32_into and read_u64_into have incorrect checks on the source buffer length, allowing the destination buffer to be under-filled. Implications: some downstream RNGs, including Hc128Rng (but not the more widely used ChaCha*Rng), allow seeding using the SeedableRng::from_seed trait-function with too short keys. = Announcement: rust-random/rand#1096 = Solution: Upgrade to >=0.6.2 = rand_core v0.6.1 βββ rand_mt v4.0.0 ```
- Loading branch information