From ${URL} : Michael Samuel (mik@miknet.net) reports: KRandom::random() should not be considered a secure PRNG due to having a limited space of random values (32bits). Reference: http://openwall.com/lists/oss-security/2013/06/26/1 http://openwall.com/lists/oss-security/2013/06/26/2 @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Red Hat says that this isn't really a KDE bug; it's using glibc's not-so-great rand() generator. Opinions? I'd be fine with closing this one.
Is this still valid?
Looks like Fedora closed their issue as not a bug.
Closed.