Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gq5x-hvxj-cp4r

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.5

Описание

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

EPSS

Процентиль: 47%
0.00241
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 16 лет назад

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

redhat
около 16 лет назад

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

CVSS3: 5.5
nvd
почти 16 лет назад

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

CVSS3: 5.5
debian
почти 16 лет назад

The get_random_int function in drivers/char/random.c in the Linux kern ...

oracle-oval
около 16 лет назад

ELSA-2009-1106: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 47%
0.00241
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-338