Description
The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1356-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2007-2446 | The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source. |
Ubuntu USN |
USN-470-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-486-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-489-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T13:42:32.344Z
Reserved: 2007-05-02T00:00:00.000Z
Link: CVE-2007-2453
No data.
Status : Deferred
Published: 2007-06-11T23:30:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-2453
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN