CVE-2009-3238

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html Mailing List
http://patchwork.kernel.org/patch/21766/ Broken Link Patch
http://secunia.com/advisories/37105 Broken Link
http://secunia.com/advisories/37351 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30 Broken Link Exploit Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1438.html Broken Link
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=499785 Issue Tracking Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=519692 Issue Tracking Permissions Required
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168 Broken Link
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03836en_us Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html Mailing List
http://patchwork.kernel.org/patch/21766/ Broken Link Patch
http://secunia.com/advisories/37105 Broken Link
http://secunia.com/advisories/37351 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30 Broken Link Exploit Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1438.html Broken Link
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=499785 Issue Tracking Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=519692 Issue Tracking Permissions Required
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168 Broken Link
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03836en_us Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*

History

No history.

Information

Published : 2009-09-18 10:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-3238

Mitre link : CVE-2009-3238

CVE.ORG link : CVE-2009-3238


JSON object : View

Products Affected

suse

  • linux_enterprise_desktop
  • linux_enterprise_server

linux

  • linux_kernel

canonical

  • ubuntu_linux

opensuse

  • opensuse
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)