CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:H/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
44.9%
The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
marc.info/?l=linux-kernel&m=118128610219959&w=2
marc.info/?l=linux-kernel&m=118128622431272&w=2
osvdb.org/37114
secunia.com/advisories/25596
secunia.com/advisories/25700
secunia.com/advisories/25961
secunia.com/advisories/26133
secunia.com/advisories/26139
secunia.com/advisories/26450
secunia.com/advisories/26620
secunia.com/advisories/26664
www.debian.org/security/2007/dsa-1356
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
www.mandriva.com/security/advisories?name=MDKSA-2007:171
www.mandriva.com/security/advisories?name=MDKSA-2007:196
www.mandriva.com/security/advisories?name=MDKSA-2007:216
www.novell.com/linux/security/advisories/2007_43_kernel.html
www.novell.com/linux/security/advisories/2007_51_kernel.html
www.securityfocus.com/bid/24390
www.securitytracker.com/id?1018248
www.ubuntu.com/usn/usn-470-1
www.ubuntu.com/usn/usn-486-1
www.ubuntu.com/usn/usn-489-1
www.vupen.com/english/advisories/2007/2105
exchange.xforce.ibmcloud.com/vulnerabilities/34781
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9960
rhn.redhat.com/errata/RHSA-2007-0376.html