Bug 1340830 (CVE-2016-1902) - CVE-2016-1902 php-symfony: SecureRandom's fallback not secure when OpenSSL fails
Summary: CVE-2016-1902 php-symfony: SecureRandom's fallback not secure when OpenSSL fails
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-1902
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1340831
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-05-30 11:26 UTC by Andrej Nemec
Modified: 2021-02-17 03:48 UTC (History)
4 users (show)

Fixed In Version: php-symfony 2.3.37
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-01-02 08:15:27 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2016-05-30 11:26:51 UTC
The SecureRandom Symfony class goal is to generate secure random numbers. Several strategies are used depending on PHP's configuration. On PHP installations where the random_bytes() function is not available, Symfony falls back to using openssl_random_pseudo_bytes(). If that does not work, Symfony generates a secure random number using uniqid() and mt_rand(), which are not suitable for cryptographic contexts.

External references:

https://symfony.com/blog/cve-2016-1902-securerandom-s-fallback-not-secure-when-openssl-fails

Comment 1 Andrej Nemec 2016-05-30 11:27:13 UTC
Created php-symfony tracking bugs for this issue:

Affects: epel-6 [bug 1340831]

Comment 2 Shawn Iwinski 2016-12-28 22:02:03 UTC
All dependent bugs closed.


Note You need to log in before you can comment on or make changes to this bug.