Summary: | dev-perl/Net-SSLeay: Entropy Source Manipulation | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jean-François Brunette (RETIRED) <formula7> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | perl |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://secunia.com/advisories/15207/ | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Jean-François Brunette (RETIRED)
2005-05-04 04:57:17 UTC
Haven't we already discussed this one - and it was moot because we don't use/provide egd? Old comment from mcummings: "No such beast in our tree (EGD that is) - it's a perl implementation to mimic /dev/random for systems that don't have one (http://egd.sourceforge.net/) - but since in Gentoo land we all have one (and those ports of portage folks - mac and bsd - haven't said anything if they don't) it hasn't/isn't an issue. I'd say this is nice, but not applicable." So I'm closing this as INVALID. If anyone disagree please feel to reopen. |