Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 96359 - <=tor-0.1.0.10 contains a security flaw
Summary: <=tor-0.1.0.10 contains a security flaw
Status: RESOLVED DUPLICATE of bug 96320
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Other
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-06-17 03:43 UTC by Richard Freeman
Modified: 2005-06-17 03:56 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Richard Freeman gentoo-dev 2005-06-17 03:43:52 UTC
The following email was sent on the tor-announce mailing list:

Hi folks,

The Tor 0.1.0.10 release from a few days ago includes a fix for a bug
that might allow an attacker to read arbitrary memory (maybe even keys)
from an exit server's process space. We haven't heard any reports of
exploits yet, but hey.

So, I recommend that you all upgrade to 0.1.0.10. :):)

If you absolutely cannot upgrade yet (for example if you're the Debian Tor
packager and your distribution is too stubborn to upgrade past libevent
1.0b, which has known crash bugs), I've included a patched tarball for
the old 0.0.9 series at:
http://tor.eff.org/dist/tor-0.0.9.10.tar.gz
http://tor.eff.org/dist/tor-0.0.9.10.tar.gz.asc

--Roger


No ebuild exists yet for the new release (which was only announced a day or two ago) - it may work with just a bump.  Also - there is a patch for the current version of tor (0.0.9.10) linked in the email above.
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-06-17 03:56:03 UTC

*** This bug has been marked as a duplicate of 96320 ***