Summary: | QCA seeds the OpenSSL RNG with low-entropy input | ||
---|---|---|---|
Product: | [Frameworks and Libraries] qca | Reporter: | Wolfgang Frisch <wolfgang.frisch> |
Component: | general | Assignee: | Unassigned bugs <unassigned-bugs-null> |
Status: | REPORTED --- | ||
Severity: | normal | CC: | aacid, bradh, justin |
Priority: | NOR | ||
Version First Reported In: | Git | ||
Target Milestone: | --- | ||
Platform: | Other | ||
OS: | Linux | ||
Latest Commit: | Version Fixed In: | ||
Sentry Crash Report: |
Description
Wolfgang Frisch
2025-02-03 10:26:10 UTC
We are in the slow process of phasing out QCA, so unless there is a real real real problem we're not going to touch it much/make new releases https://invent.kde.org/libraries/qca/-/issues/18 (In reply to Albert Astals Cid from comment #1) > We are in the slow process of phasing out QCA, so unless there is a real > real real problem we're not going to touch it much/make new releases > > https://invent.kde.org/libraries/qca/-/issues/18 Thanks for the clarification. In that case it doesn't make much sense to pursue this further, since OpenSSL mitigates the problem. |