CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
31.1%
Stack-based buffer overflow in the random number generator (RNG)
implementation in the Linux kernel before 2.6.22 might allow local root
users to cause a denial of service or gain privileges by setting the
default wakeup threshold to a value greater than the output pool size,
which triggers writing random numbers to the stack by the pool transfer
function involving “bound check ordering”. NOTE: this issue might only
cross privilege boundaries in environments that have granular assignment of
privileges for root.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 6.06 | noarch | linux-source-2.6.15 | < 2.6.15-29.58 | UNKNOWN |
ubuntu | 6.10 | noarch | linux-source-2.6.17 | < 2.6.17.1-12.40 | UNKNOWN |
ubuntu | 7.04 | noarch | linux-source-2.6.20 | < 2.6.20-16.31 | UNKNOWN |