Debian: DSA-2331-1: tor security update

    Date28 Oct 2011
    CategoryDebian
    40
    Posted ByLinuxSecurity Advisories
    It has been discovered by "frosty_un" that a design flaw in Tor, an online privacy tool, allows malicious relay servers to learn certain information that they should not be able to learn. Specifically, a relay that a user connects to directly could learn which other relays that user is
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA-2331-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Moritz Muehlenhoff
    October 28, 2011                       http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : tor
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2011-2768 CVE-2011-2769 
    
    It has been discovered by "frosty_un" that a design flaw in Tor, an online
    privacy tool, allows malicious relay servers to learn certain information
    that they should not be able to learn. Specifically, a relay that a user
    connects to directly could learn which other relays that user is 
    connected to directly. In combination with other attacks, this issue 
    can lead to deanonymizing the user.  The Common Vulnerabilities and 
    Exposures project has assigned CVE-2011-2768 to this issue.
    
    In addition to fixing the above mentioned issues, the updates to oldstable
    and stable fix a number of less critical issues (CVE-2011-2769). Please 
    see this posting from the Tor blog for more information:
    https://blog.torproject.org/blog/tor-02234-released-security-patches
    
    For the oldstable distribution (lenny), this problem has been fixed in
    version 0.2.1.31-1~lenny+1. Due to technical limitations in the Debian
    archive scripts, the update cannot be released synchronously with the
    packages for stable. It will be released shortly.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 0.2.1.31-1.
    
    For the unstable and testing distributions, this problem has been fixed in
    version 0.2.2.34-1.
    
    For the experimental distribution, this problem have has fixed in version
    0.2.3.6-alpha-1.
    
    We recommend that you upgrade your tor packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"3","type":"x","order":"3","pct":21.43,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.