CVE-2009-3238 — Use of Cryptographically Weak Pseudo-Random Number Generator in Kernel
Severity
5.5MEDIUMNVD
EPSS
0.2%
top 52.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 18
Latest updateMay 2
Description
The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Ubuntu Linux 6.06, 8.04, 8.10, 9.04
Patches
🔴Vulnerability Details
2📋Vendor Advisories
2📐Framework References
2💬Community
1Bugzilla
▶