Upstream information

CVE-2009-3238 at MITRE

Description

The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."

SUSE information

Overall state of this security issue: Ignore

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.8
Vector AV:N/AC:L/Au:N/C:C/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 541658 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.0
  • kernel-debug-debuginfo >= 2.6.25.20-0.6
  • kernel-debug-debugsource >= 2.6.25.20-0.6
  • kernel-default-debuginfo >= 2.6.25.20-0.6
  • kernel-default-debugsource >= 2.6.25.20-0.6
  • kernel-kdump-debuginfo >= 2.6.25.20-0.6
  • kernel-kdump-debugsource >= 2.6.25.20-0.6
  • kernel-pae-debuginfo >= 2.6.25.20-0.6
  • kernel-pae-debugsource >= 2.6.25.20-0.6
  • kernel-ppc64-debuginfo >= 2.6.25.20-0.6
  • kernel-ppc64-debugsource >= 2.6.25.20-0.6
  • kernel-ps3-debuginfo >= 2.6.25.20-0.6
  • kernel-ps3-debugsource >= 2.6.25.20-0.6
  • kernel-source-debuginfo >= 2.6.25.20-0.6
  • kernel-vanilla-debuginfo >= 2.6.25.20-0.6
  • kernel-vanilla-debugsource >= 2.6.25.20-0.6
  • kernel-xen-debuginfo >= 2.6.25.20-0.6
  • kernel-xen-debugsource >= 2.6.25.20-0.6
openSUSE 11.0
  • acerhk-kmp-debug >= 0.5.35_2.6.25.20_0.6-98.1
  • acx-kmp-debug >= 20080210_2.6.25.20_0.6-4.1
  • appleir-kmp-debug >= 1.1_2.6.25.20_0.6-108.1
  • at76_usb-kmp-debug >= 0.17_2.6.25.20_0.6-2.1
  • atl2-kmp-debug >= 2.0.4_2.6.25.20_0.6-4.1
  • aufs-kmp-debug >= cvs20080429_2.6.25.20_0.6-13.3
  • dazuko-kmp-debug >= 2.3.4.4_2.6.25.20_0.6-42.1
  • drbd-kmp-debug >= 8.2.6_2.6.25.20_0.6-0.2
  • gspcav-kmp-debug >= 01.00.20_2.6.25.20_0.6-1.1
  • iscsitarget-kmp-debug >= 0.4.15_2.6.25.20_0.6-63.1
  • ivtv-kmp-debug >= 1.0.3_2.6.25.20_0.6-66.1
  • kernel-debug >= 2.6.25.20-0.6
  • kernel-default >= 2.6.25.20-0.6
  • kernel-docs >= 2.6.25.20-0.6
  • kernel-kdump >= 2.6.25.20-0.6
  • kernel-pae >= 2.6.25.20-0.6
  • kernel-ppc64 >= 2.6.25.20-0.6
  • kernel-ps3 >= 2.6.25.20-0.6
  • kernel-source >= 2.6.25.20-0.6
  • kernel-syms >= 2.6.25.20-0.6
  • kernel-vanilla >= 2.6.25.20-0.6
  • kernel-xen >= 2.6.25.20-0.6
  • kqemu-kmp-debug >= 1.3.0pre11_2.6.25.20_0.6-7.1
  • nouveau-kmp-debug >= 0.10.1.20081112_2.6.25.20_0.6-0.4
  • omnibook-kmp-debug >= 20080313_2.6.25.20_0.6-1.1
  • pcc-acpi-kmp-debug >= 0.9_2.6.25.20_0.6-4.1
  • pcfclock-kmp-debug >= 0.44_2.6.25.20_0.6-207.1
  • tpctl-kmp-debug >= 4.17_2.6.25.20_0.6-189.1
  • uvcvideo-kmp-debug >= r200_2.6.25.20_0.6-2.4
  • virtualbox-ose-kmp-debug >= 1.5.6_2.6.25.20_0.6-33.5
  • vmware-kmp-debug >= 2008.04.14_2.6.25.20_0.6-21.1
  • wlan-ng-kmp-debug >= 0.2.8_2.6.25.20_0.6-107.1
SUSE Linux Enterprise SDK 10 SP3
  • kernel-kdump >= 2.6.16.60-0.57.1
sles10-sp3-debuginfo.ppc
sles10-sp3.ppc
sle10-sp3-sdk.ppc
ZYPP Patch Nr: 6639
SUSE Linux Enterprise Server 10 SP3
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-iseries64 >= 2.6.16.60-0.57.1
  • kernel-kdump >= 2.6.16.60-0.57.1
  • kernel-ppc64 >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
sles10-sp3-debuginfo.ppc
sles10-sp3.ppc
sle10-sp3-sdk.ppc
ZYPP Patch Nr: 6639
SUSE Linux Enterprise SDK 10 SP2
  • kernel-debug >= 2.6.16.60-0.42.7
sles10-sp2-debuginfo.ia64
sle10-sp2-sdk.ia64
sles10-sp2.ia64
ZYPP Patch Nr: 6633
SUSE Linux Enterprise Desktop 10 SP3 for x86
  • kernel-bigsmp >= 2.6.16.60-0.57.1
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-smp >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
  • kernel-xen >= 2.6.16.60-0.57.1
  • kernel-xenpae >= 2.6.16.60-0.57.1
sles10-sp3.x86
sles10-sp3-debuginfo.x86
sled10-sp3.x86
sle10-sp3-sdk.x86
ZYPP Patch Nr: 6637
SUSE Linux Enterprise SDK 10 SP3
  • kernel-debug >= 2.6.16.60-0.57.1
  • kernel-kdump >= 2.6.16.60-0.57.1
  • kernel-xen >= 2.6.16.60-0.57.1
  • kernel-xenpae >= 2.6.16.60-0.57.1
sles10-sp3.x86
sles10-sp3-debuginfo.x86
sled10-sp3.x86
sle10-sp3-sdk.x86
ZYPP Patch Nr: 6637
SUSE Linux Enterprise Server 10 SP3
  • kernel-bigsmp >= 2.6.16.60-0.57.1
  • kernel-debug >= 2.6.16.60-0.57.1
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-kdump >= 2.6.16.60-0.57.1
  • kernel-kdumppae >= 2.6.16.60-0.57.1
  • kernel-smp >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
  • kernel-vmi >= 2.6.16.60-0.57.1
  • kernel-vmipae >= 2.6.16.60-0.57.1
  • kernel-xen >= 2.6.16.60-0.57.1
  • kernel-xenpae >= 2.6.16.60-0.57.1
sles10-sp3.x86
sles10-sp3-debuginfo.x86
sled10-sp3.x86
sle10-sp3-sdk.x86
ZYPP Patch Nr: 6637
SUSE Linux Enterprise SDK 10 SP3
  • kernel-debug >= 2.6.16.60-0.57.1
sles10-sp3-debuginfo.ia64
sle10-sp3-sdk.ia64
sles10-sp3.ia64
ZYPP Patch Nr: 6638
SUSE Linux Enterprise Server 10 SP3
  • kernel-debug >= 2.6.16.60-0.57.1
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
sles10-sp3-debuginfo.ia64
sle10-sp3-sdk.ia64
sles10-sp3.ia64
ZYPP Patch Nr: 6638
SUSE Linux Enterprise SDK 10 SP2
  • kernel-kdump >= 2.6.16.60-0.42.7
sles10-sp2.ppc
sles10-sp2-debuginfo.ppc
sle10-sp2-sdk.ppc
ZYPP Patch Nr: 6634
SUSE Linux Enterprise Server 10 SP3
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
sles10-sp3.s390x
sles10-sp3-debuginfo.s390x
ZYPP Patch Nr: 6640
SUSE Linux Enterprise SDK 10 SP2
  • kernel-debug >= 2.6.16.60-0.42.7
  • kernel-kdump >= 2.6.16.60-0.42.7
  • kernel-xen >= 2.6.16.60-0.42.7
  • kernel-xenpae >= 2.6.16.60-0.42.7
sled10-sp2.x86
sle10-sp2-sdk.x86
sles10-sp2.x86
sles10-sp2-debuginfo.x86
ZYPP Patch Nr: 6632
SUSE Linux Enterprise SDK 10 SP2
  • kernel-debug >= 2.6.16.60-0.42.7
  • kernel-kdump >= 2.6.16.60-0.42.7
  • kernel-xen >= 2.6.16.60-0.42.7
sled10-sp2.x86-64
sle10-sp2-sdk.x86-64
sles10-sp2.x86-64
sles10-sp2-debuginfo.x86-64
ZYPP Patch Nr: 6636
SUSE Linux Enterprise Desktop 10 SP3 for AMD64 and Intel EM64T
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-smp >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
  • kernel-xen >= 2.6.16.60-0.57.1
sle10-sp3-sdk.x86-64
sled10-sp3.x86-64
sles10-sp3.x86-64
sles10-sp3-debuginfo.x86-64
ZYPP Patch Nr: 6641
SUSE Linux Enterprise SDK 10 SP3
  • kernel-debug >= 2.6.16.60-0.57.1
  • kernel-kdump >= 2.6.16.60-0.57.1
  • kernel-xen >= 2.6.16.60-0.57.1
sle10-sp3-sdk.x86-64
sled10-sp3.x86-64
sles10-sp3.x86-64
sles10-sp3-debuginfo.x86-64
ZYPP Patch Nr: 6641
SUSE Linux Enterprise SDK 10 SP3
  • kernel-debug >= 2.6.16.60-0.57.1
  • kernel-default >= 2.6.16.60-0.57.1
  • kernel-kdump >= 2.6.16.60-0.57.1
  • kernel-smp >= 2.6.16.60-0.57.1
  • kernel-source >= 2.6.16.60-0.57.1
  • kernel-syms >= 2.6.16.60-0.57.1
  • kernel-xen >= 2.6.16.60-0.57.1
sle10-sp3-sdk.x86-64
sled10-sp3.x86-64
sles10-sp3.x86-64
sles10-sp3-debuginfo.x86-64
ZYPP Patch Nr: 6641


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Linux Enterprise Desktop 12 SP4 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 12 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 GA kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 GA kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP1 LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2 LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP3 LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP3 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP4 kernel-source Analysis