Return-Path: X-Original-To: apmail-commons-issues-archive@minotaur.apache.org Delivered-To: apmail-commons-issues-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 79CF19896 for ; Tue, 23 Dec 2014 21:56:14 +0000 (UTC) Received: (qmail 88497 invoked by uid 500); 23 Dec 2014 21:56:14 -0000 Delivered-To: apmail-commons-issues-archive@commons.apache.org Received: (qmail 88342 invoked by uid 500); 23 Dec 2014 21:56:14 -0000 Mailing-List: contact issues-help@commons.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: issues@commons.apache.org Delivered-To: mailing list issues@commons.apache.org Received: (qmail 88054 invoked by uid 99); 23 Dec 2014 21:56:14 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 23 Dec 2014 21:56:14 +0000 Date: Tue, 23 Dec 2014 21:56:14 +0000 (UTC) From: "David Camilo Espitia Manrique (JIRA)" To: issues@commons.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Created] (MATH-1182) BUG - Insufficient Entropy in Commons-math3-3.3 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 David Camilo Espitia Manrique created MATH-1182: --------------------------------------------------- Summary: BUG - Insufficient Entropy in Commons-math3-3.3 Key: MATH-1182 URL: https://issues.apache.org/jira/browse/MATH-1182 Project: Commons Math Issue Type: Bug Affects Versions: 3.3 Reporter: David Camilo Espitia Manrique Fix For: 3.3 We are currently using Commons-math3-3.3 and in the analysis for veracode, found this bug in these class: 1. FastMath.java (Line 813) 2. SynchronizedRandomGenerator.java (Line 78 and Line 85) 3. UniformIntegerDistribution.java (Line 164 and Line 172) Type : Insufficient Entropy Description: Standard random number generators do not provide a sufficient amount of entropy when used for security purposes. Attackers can brute force the output of pseudorandom number generators such as rand(). Recommendations: If this random number is used where security is a concern, such as generating a session key or session identifier, use a trusted cryptographic random number generator instead. These can be found on the Windows platform in the CryptoAPI or in an open source library such as OpenSSL. Thanks. -- This message was sent by Atlassian JIRA (v6.3.4#6332)