Summary: | sys-freebsd/freebsd-sources Random value disclosure (CVE-2007-6150) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | bsd+disabled, uberlord |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://security.freebsd.org/advisories/FreeBSD-SA-07:09.random.asc | ||
Whiteboard: | ~4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
2007-12-01 21:47:09 UTC
BSD herd, please advise. Patch is trivial and should be applied. However it's probably not that essential as it does require local access. 6.2-r4 has the patch funnily enough, we all know these days how having good source of randomness is important ;) Thanks, closing. Also, don't forget to remove vulnerable versions. |