This is the DEBIAN AND RELATED DISTROS (like the *ubuntu family) related bug, right, not a general OpenSSL vulnerability?
If so, the idea is that if your PRNG isn't seeded with random-enough data (the worst example being seeding it with a time(0) call, effectively using the current data as a seed), hackers/crackers can substantially reduce the time it takes to brute-force the protection. This has happened with at least one software protection scheme as well, there was a fully-working keygen out for asprotect some years ago, for example.