[tor-bugs] #31967 [Circumvention/BridgeDB]: BridgeDB Server uses insecure pseudorandom generator for selecting cached captcha

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Mar 24 16:42:57 UTC 2020


#31967: BridgeDB Server uses insecure pseudorandom generator for selecting cached
captcha
------------------------------------+-----------------------------------
 Reporter:  willbarr                |          Owner:  (none)
     Type:  defect                  |         Status:  closed
 Priority:  Medium                  |      Milestone:
Component:  Circumvention/BridgeDB  |        Version:  sbws: unspecified
 Severity:  Normal                  |     Resolution:  fixed
 Keywords:                          |  Actual Points:
Parent ID:                          |         Points:
 Reviewer:                          |        Sponsor:
------------------------------------+-----------------------------------
Changes (by phw):

 * status:  needs_review => closed
 * resolution:   => fixed


Comment:

 Replying to [comment:10 agix]:
 > Well I guess this makes me officially the poster child for human
 stupidity.
 [[br]]
 Don't worry, this happens to the best of us :)
 [[br]]
 > Nevertheless, here is finally the correct patch.
 [[br]]
 Thanks, the patch looks good to me! I merged it into develop and added
 [https://gitweb.torproject.org/bridgedb.git/commit/?h=develop&id=a1f0e51fd7a082676f880e0783cc9ec9c94bae2f
 a CHANGELOG entry]. I'll deploy the patch in the next few days, once I had
 time to fix the broken installation process.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31967#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list