-
Notifications
You must be signed in to change notification settings - Fork 305
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
random_compat 1.x not insecure if on patched PHP version? #259
Comments
@andrerom If you think there is something to change, please submit a pull request. I'm mostly merging pull requests here, so any issue won't be fixed by "maintainers" of this repo :) |
Posted the relevant question on paragonie/random_compat#96 (comment), based on feedback ew can sew if there is anything we could change here. Solution could be a 1.5 which requires the relevant PHP versions which fixes this >=1.5 can be whitelisted. |
Summary As there does not seems to be a way to annotate that 1.x is only really vulnerable on PHP 5.6.23 and lower, I guess this can be closed as can't fix as long as there is no random_compat 1.x release requiring said PHP versions which fixes this. |
Not that it's so relevant anymore, but from the looks of it seems the version rule on random_compat might be a bit too strict, as the underlying lack of randomness with openssl issue seems to have been fixed in later version of PHP:
php/php-src@0e2447c
The text was updated successfully, but these errors were encountered: