| Summary: | QCA seeds the OpenSSL RNG with low-entropy input | ||
|---|---|---|---|
| Product: | [Frameworks and Libraries] qca | Reporter: | Wolfgang Frisch <wolfgang.frisch> |
| Component: | general | Assignee: | Unassigned bugs <unassigned-bugs-null> |
| Status: | REPORTED --- | ||
| Severity: | normal | CC: | aacid, bradh, justin |
| Priority: | NOR | ||
| Version First Reported In: | Git | ||
| Target Milestone: | --- | ||
| Platform: | Other | ||
| OS: | Linux | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
|
Description
Wolfgang Frisch
2025-02-03 10:26:10 UTC
We are in the slow process of phasing out QCA, so unless there is a real real real problem we're not going to touch it much/make new releases https://invent.kde.org/libraries/qca/-/issues/18 (In reply to Albert Astals Cid from comment #1) > We are in the slow process of phasing out QCA, so unless there is a real > real real problem we're not going to touch it much/make new releases > > https://invent.kde.org/libraries/qca/-/issues/18 Thanks for the clarification. In that case it doesn't make much sense to pursue this further, since OpenSSL mitigates the problem. |