Under some conditions, weak PRNG generator is used.
vulners.com/securityvulns/securityvulns:doc:29851