Описание
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
Ссылки
- Broken Link
- Mailing List
- Mailing List
- Broken LinkPatch
- Broken Link
- Broken Link
- Broken LinkExploitVendor Advisory
- Broken Link
- Third Party Advisory
- Issue TrackingPermissions Required
- Issue TrackingPermissions Required
- Broken Link
- Third Party Advisory
- Broken Link
- Mailing List
- Mailing List
- Broken LinkPatch
- Broken Link
- Broken Link
- Broken LinkExploitVendor Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
5.5 Medium
CVSS3
7.8 High
CVSS2
Дефекты
Связанные уязвимости
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
The get_random_int function in drivers/char/random.c in the Linux kern ...
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
ELSA-2009-1106: kernel security and bug fix update (IMPORTANT)
EPSS
5.5 Medium
CVSS3
7.8 High
CVSS2