CVE-2009-3238Use of Cryptographically Weak Pseudo-Random Number Generator in Kernel

Severity
5.5MEDIUMNVD
EPSS
0.2%
top 52.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18
Latest updateMay 2

Description

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

Also affects: Ubuntu Linux 6.06, 8.04, 8.10, 9.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-gq5x-hvxj-cp4r: The get_random_int function in drivers/char/random2022-05-02
CVEList
CVE-2009-3238: The get_random_int function in drivers/char/random2009-09-18

📋Vendor Advisories

2
Ubuntu
Linux kernel vulnerabilities2009-10-22
Red Hat
kernel: random: add robust get_random_u32, remove weak get_random_int2009-05-05

📐Framework References

2
CWE
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CWE
Use of Insufficiently Random Values

💬Community

1
Bugzilla
CVE-2009-3238 kernel: random: add robust get_random_u32, remove weak get_random_int2009-09-21
CVE-2009-3238 — Linux Kernel vulnerability | cvebase