Description
The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2024-08-07T10:40:17.200Z
Reserved: 2008-11-19T00:00:00.000Z
Link: CVE-2008-5162
No data.
Status : Deferred
Published: 2008-11-26T23:30:00.467
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5162
No data.
OpenCVE Enrichment
No data.
Weaknesses