The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1356-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2007-2446 | The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source. |
Ubuntu USN |
USN-470-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-486-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-489-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T13:42:32.344Z
Reserved: 2007-05-02T00:00:00
Link: CVE-2007-2453
No data.
Status : Deferred
Published: 2007-06-11T23:30:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-2453
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN