First published: Wed Nov 26 2008(Updated: )
The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
Credit: secteam@freebsd.org secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =6.4 | |
FreeBSD FreeBSD | =6.3 | |
FreeBSD FreeBSD | =7.0 | |
FreeBSD FreeBSD | =7.1 | |
FreeBSD FreeBSD | >=6.4<7.0 | |
FreeBSD FreeBSD | =6.3 | |
FreeBSD FreeBSD | =6.3-p1 | |
FreeBSD FreeBSD | =6.3-p2 | |
FreeBSD FreeBSD | =6.3-p3 | |
FreeBSD FreeBSD | =6.3-p4 | |
FreeBSD FreeBSD | =6.3-p5 | |
FreeBSD FreeBSD | =7.0 | |
FreeBSD FreeBSD | =7.0-p1 | |
FreeBSD FreeBSD | =7.0-p3 | |
FreeBSD FreeBSD | =7.0-p4 | |
FreeBSD FreeBSD | =7.0-p5 | |
FreeBSD FreeBSD | =7.1 | |
FreeBSD FreeBSD | =7.1-p1 | |
FreeBSD FreeBSD | =7.1-p10 | |
FreeBSD FreeBSD | =7.1-p12 | |
FreeBSD FreeBSD | =7.1-p13 | |
FreeBSD FreeBSD | =7.1-p14 | |
FreeBSD FreeBSD | =7.1-p15 | |
FreeBSD FreeBSD | =7.1-p16 | |
FreeBSD FreeBSD | =7.1-p2 | |
FreeBSD FreeBSD | =7.1-p3 | |
FreeBSD FreeBSD | =7.1-p4 | |
FreeBSD FreeBSD | =7.1-p5 | |
FreeBSD FreeBSD | =7.1-p6 | |
FreeBSD FreeBSD | =7.1-p7 | |
FreeBSD FreeBSD | =7.1-p8 | |
FreeBSD FreeBSD | =7.1-p9 | |
FreeBSD FreeBSD | =7.1-rc1 | |
FreeBSD FreeBSD | =7.1-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.