Description
Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1363-1 | New Linux 2.6.18 packages fix several vulnerabilities |
Debian DSA |
DSA-1504-1 | New Linux kernel 2.6.8 packages fix several issues |
EUVD |
EUVD-2007-3097 | Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root. |
Ubuntu USN |
USN-508-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-509-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-510-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:05:29.306Z
Reserved: 2007-06-07T00:00:00.000Z
Link: CVE-2007-3105
No data.
Status : Deferred
Published: 2007-07-27T21:30:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-3105
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN