CVE-2009-3238

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*

History

No history.

Information

Published : 2009-09-18 10:30

Updated : 2024-02-15 03:30


NVD link : CVE-2009-3238

Mitre link : CVE-2009-3238

CVE.ORG link : CVE-2009-3238


JSON object : View

Products Affected

suse

  • linux_enterprise_desktop
  • linux_enterprise_server

canonical

  • ubuntu_linux

linux

  • linux_kernel

opensuse

  • opensuse
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)