Predictable seed in pseudo-random number generator (prng) in Linux kernel - CVE-2007-2453

 

Predictable seed in pseudo-random number generator (prng) in Linux kernel - CVE-2007-2453

Published: June 12, 2007 / Updated: October 30, 2018


Vulnerability identifier: #VU95256
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2007-2453
CWE-ID: CWE-337
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to gain access to sensitive information.

The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.


How to mitigate CVE-2007-2453

Install update from vendor's repository.

Sources