Red Hat Bugzilla – Bug 229883
CVE-2007-0006 Key serial number collision problem
Last modified: 2018-10-19 18:12:43 EDT
+++ This bug was initially created as a clone of Bug #227497 +++
The key serial number collision avoidance code is wrong.
This didn't use to be a problem as the key serial numbers were allocated from
a simple incremented counter, and you'd have to go through 2 billion keys
before encountering a collision.
However, now that random numbers are used instead, collisions are much more
-- Additional comment from firstname.lastname@example.org on 2007-02-06 09:23 EST --
upstream patch is here:
-- Additional comment from email@example.com on 2007-02-06 09:29 EST --
Created an attachment (id=147467)
Proposed patch from David Howells
-- Additional comment from firstname.lastname@example.org on 2007-02-07 11:20 EST --
This is proposed as a Security Day 0 errata for 5.0.
Cleared rhel-5.0.0 and blocker and set rhel-5.1.0 flag.
-- Additional comment from email@example.com on 2007-02-23 14:04 EST --
QE ack for RHEL5.
We haven't been able to reproduce the problem with the reproducer attached to
the rhel 4 version of this bug, but the patch is in the 8.1.1 kernel.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.