|
|
| |
|
| |
kernel: off by one error
| Package(s): | kernel |
CVE #(s): | CVE-2013-4345
|
| Created: | October 1, 2013 |
Updated: | October 3, 2013 |
| Description: |
From the Red Hat bugzilla:
A flaw was found in the way ansi cprng implementation in the Linux kernel processed non-block size aligned requests. If several small requests are made that are less than the instances block size, the remainder for loop code doesn't increment rand_data_valid in the last iteration, meaning that the last bytes in the rand_data buffer gets reused on the subsequent smaller-than-a-block request for random data. |
| Alerts: |
|
( Log in to post comments)
|
|
|