Vulnerability Description
The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.4.34 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3
- http://secunia.com/advisories/29058Vendor Advisory
- http://www.debian.org/security/2008/dsa-1503
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
- http://www.securityfocus.com/bid/25029
- http://www.vupen.com/english/advisories/2007/2690Vendor Advisory
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3
- http://secunia.com/advisories/29058Vendor Advisory
- http://www.debian.org/security/2008/dsa-1503
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
- http://www.securityfocus.com/bid/25029
FAQ
What is CVE-2007-4311?
CVE-2007-4311 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attac...
How severe is CVE-2007-4311?
CVE-2007-4311 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4311?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.