SB20240620131 - Use of cryptographically weak pseudo-random number generator (prng) in Linux kernel
Published: June 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use of cryptographically weak pseudo-random number generator (prng) (CVE-ID: CVE-2009-3238)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to use of cryptographically weak pseudo-random number generator (prng) error. A local user can gain access to sensitive information.
Remediation
Install update from vendor's website.
References
- http://patchwork.kernel.org/patch/21766/
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30
- https://bugzilla.redhat.com/show_bug.cgi?id=499785
- http://www.redhat.com/support/errata/RHSA-2009-1438.html
- https://bugzilla.redhat.com/show_bug.cgi?id=519692
- http://secunia.com/advisories/37351
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
- http://secunia.com/advisories/37105
- http://www.ubuntu.com/usn/USN-852-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03836en_us
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02