The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2024-08-07T10:40:17.200Z
Reserved: 2008-11-19T00:00:00
Link: CVE-2008-5162
No data.
Status : Deferred
Published: 2008-11-26T23:30:00.467
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5162
No data.
OpenCVE Enrichment
No data.