Upstream information
Description
The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.SUSE information
Overall state of this security issue: Resolved
This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.
National Vulnerability Database | |
---|---|
Base Score | 1.2 |
Vector | AV:L/AC:H/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
SUSE Security Advisories:
- SUSE-SA:2007:043, published Mon, 09 Jul 2007 13:00:00 +0000
- SUSE-SA:2007:051, published Thu, 06 Sep 2007 17:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 03:26:56 2013CVE page last modified: Sat Oct 5 11:12:16 2024