The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator.
http://www.vupen.com/english/advisories/2007/2690
http://www.securityfocus.com/bid/25029
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.6
http://www.debian.org/security/2008/dsa-1503