CVE-2006-3419
Publication date 7 July 2006
Last updated 24 July 2024
Ubuntu priority
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
Status
Package | Ubuntu Release | Status |
---|---|---|
tor | 9.10 karmic | Not in release |
9.04 jaunty | Not in release | |
8.10 intrepid |
Fixed 0.1.1.20-1
|
|
8.04 LTS hardy |
Fixed 0.1.1.20-1
|
|
7.10 gutsy |
Fixed 0.1.1.20-1
|
|
7.04 feisty |
Fixed 0.1.1.20-1
|
|
6.10 edgy |
Fixed 0.1.1.20-1
|
|
6.06 LTS dapper | Ignored end of life |