Package has been removed from Oneiric.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804594
Title:
reseed(8) performs HTTP fetch of data from random.org
To manage notifications about this bug go
The HTTP issue has been given CVE-2011-2683.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2683
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804594
Title:
reseed(8)
Have subscribed the security team to see if anyone there wants to chime
in
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804594
Title:
reseed(8) performs HTTP fetch of data from random.org
To
Thank you for taking the time to report this bug and helping to make
Ubuntu better. I apologize for not responding sooner. I can confirm this
issue and have given it an initial Importance of 'Low', based on the
difficulty of properly timing the attack while also requiring MITM
access. This can be
I'm not sure I see why this is difficult to exploit in a MITM attack or
why the timing is difficult.
It would be easy to build a simple tool to MITM people who execute
reseed(8) while connected to an open wireless network (e.g., at
Starbucks). The automated tool could wait for a call to
** Attachment added: reseed script
https://bugs.launchpad.net/bugs/804594/+attachment/2187307/+files/reseed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804594
Title:
reseed(8) performs HTTP
** Attachment added: Wireshark trace
https://bugs.launchpad.net/ubuntu/+source/reseed/+bug/804594/+attachment/2187308/+files/reseed-http.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804594