The random number feature in Linux kernel 2.6 before 126.96.36.199, and 2.6.21.x before 188.8.131.52, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
Publish Date : 2007-06-11 Last Update Date : 2012-10-30
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.