Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-16166

Опубликовано: 30 июл. 2020
Источник: debian
EPSS Низкий

Описание

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.7.17-1package
linuxfixed4.19.146-1busterpackage

Примечания

  • https://git.kernel.org/linus/f227e3ec3b5cad859ad15666874405e8c1bbc1d4

EPSS

Процентиль: 82%
0.01848
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
почти 5 лет назад

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

CVSS3: 3.7
redhat
почти 5 лет назад

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

CVSS3: 3.7
nvd
почти 5 лет назад

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

CVSS3: 3.7
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 3.7
github
около 3 лет назад

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

EPSS

Процентиль: 82%
0.01848
Низкий