DescriptionThe random number feature in Linux kernel 2.6 before 18.104.22.168, and 2.6.21.x before 22.214.171.124, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SA:2007:043, published Mon, 09 Jul 2007 13:00:00 +0000
- SUSE-SA:2007:051, published Thu, 06 Sep 2007 17:00:00 +0000
SUSE Timeline for this CVECVE page created: Fri Jun 28 03:26:56 2013
CVE page last modified: Fri Oct 7 12:45:36 2022