This bug has been copied from bug #693723 and has been proposed to be backported to 5.6 z-stream (EUS).
Fixed in selinux-policy-2.4.6-300.el5_6.1
Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: The sshd service, ssh clients, and other SSH-aware utilities require access to the /dev/random and /dev/urandom random number generators. Prior to this update, SELinux incorrectly prevented the ssh-keygen utility from accessing the /dev/random device. This update adapts SELinux policies to allow this access, and ssh-keygen is now able to read data from /dev/random as expected.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-0481.html