Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1108

Опубликовано: 12 апр. 2018
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.

A weakness was found in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelFix deferred
Red Hat Enterprise Linux 7kernel-altFix deferred
Red Hat Enterprise Linux 7kernel-rtFix deferred
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-330
https://bugzilla.redhat.com/show_bug.cgi?id=1567306kernel: drivers: getrandom(2) unblocks too early after system boot

EPSS

Процентиль: 26%
0.00086
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 7 лет назад

kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.

CVSS3: 5.9
nvd
около 7 лет назад

kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.

CVSS3: 5.9
debian
около 7 лет назад

kernel drivers before version 4.17-rc1 are vulnerable to a weakness in ...

CVSS3: 5.9
github
около 3 лет назад

kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 26%
0.00086
Низкий

5.9 Medium

CVSS3