lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1YZksY-0000F0-FL@pool.mine.nu>
Date: Sun, 22 Mar 2015 19:45:42 +0100
From: Sebastien Delafond <seb@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3203-1] tor security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3203-1                   security@...ian.org
http://www.debian.org/security/                        Sebastien Delafond
March 22, 2015                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tor

Several denial-of-service issues have been discovered in Tor, a
connection-based low-latency anonymous communication system.

  o Jowr discovered that very high DNS query load on a relay could
    trigger an assertion error.

  o A relay could crash with an assertion error if a buffer of exactly
    the wrong layout was passed to buf_pullup() at exactly the wrong
    time.

For the stable distribution (wheezy), these problems have been fixed
in version 0.2.4.26-1.

For the testing distribution (jessie) and unstable distribution (sid),
these problems have been fixed in version 0.2.5.11-1.

Furthermore, this update disables support for SSLv3 in Tor. All
versions of OpenSSL in use with Tor today support TLS 1.0 or later.

Additionally, this release updates the geoIP database used by Tor as
well as the list of directory authority servers, which Tor clients use
to bootstrap and who sign the Tor directory consensus document.

We recommend that you upgrade your tor packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJVDvjZAAoJEBC+iYPz1Z1kK8YH/3xW7GD1ExJPa6QNsROF65rE
Awd1jw2b3oUXBcQchXrFxcjb4nJyXuDIbAzeJfHFieElHB2ShAGvmLLoTtwwUuCu
RnGo/HlVe/iIu2CSZqfzX8ATcFx5ueA3IETvYWodbyMXl0VgC6g/gPZI0h8LuNXb
4scn9mqK3Jdw6VBBSycANRcQDclKQEEv0nFj8CdKkAe6TSIOD/dVvimKclPgJLYg
vEemfZQtqnJU+f5syx7f2kR8hbpKuYVm12hsmNpZvCIuAHequkrT3SPDh4kyskka
uRFdtgiSmtzjnfEWEf6kIOcrOfDRHYkcFo2gHxNIsvrb66sAZ/WUXIPAV+iVgWI=
=v7t7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ