The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator.
References
Configurations
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=bd67d4c7b11cc33ebdc346bc8926d255b354cd64 - | |
References | () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=faa3369ac2ea7feb0dd266b6a5e8d6ab153cf925 - | |
References | () http://secunia.com/advisories/29058 - Vendor Advisory | |
References | () http://www.debian.org/security/2008/dsa-1503 - | |
References | () http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6 - | |
References | () http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35 - | |
References | () http://www.securityfocus.com/bid/25029 - | |
References | () http://www.vupen.com/english/advisories/2007/2690 - Vendor Advisory |
Information
Published : 2007-08-13 21:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4311
Mitre link : CVE-2007-4311
CVE.ORG link : CVE-2007-4311
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-310
Cryptographic Issues