CVE-2008-5162 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5162): The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
http://www.gentoo.org/security/en/vulnerability-policy.xml does not list BSD, still I thought it would be ok to let bsd know this. I looked at the code, seems 6.2 also needs the patch.
According to the Gentoo Linux Vulnerability Treatment Policy, we're not handling freebsd bugs, closing.
(In reply to comment #2) > According to the Gentoo Linux Vulnerability Treatment Policy, we're not > handling freebsd bugs, closing. still that's not fixed...
Sorry, I handled this wrong. It needs to be fixed, too, of course.
fixed now in sources-6.2-r5
Thanks!