Name | CVE-2007-3105 |
Description | Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1363-1, DSA-1504-1 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
fai-kernels | source | sarge | 1.9.1sarge8 | DSA-1504-1 | ||
kernel-image-2.6.8-alpha | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-amd64 | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-hppa | source | sarge | 2.6.8-7sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-i386 | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-ia64 | source | sarge | 2.6.8-15sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-m68k | source | sarge | 2.6.8-5sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-s390 | source | sarge | 2.6.8-6sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-sparc | source | sarge | 2.6.8-16sarge1 | DSA-1504-1 | ||
kernel-patch-powerpc-2.6.8 | source | sarge | 2.6.8-13sarge1 | DSA-1504-1 | ||
kernel-source-2.6.8 | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
linux-2.6 | source | etch | 2.6.18.dfsg.1-13etch2 | DSA-1363-1 | ||
linux-2.6 | source | (unstable) | 2.6.22-4 |