[MacPorts] #52655: tor-devel updated to 0.2.9.4-alpha (includes security fix) (was: tpr-devel updated to 0.2.9.4-alpha (includes security fix))
MacPorts
noreply at macports.org
Wed Oct 19 16:16:36 CEST 2016
#52655: tor-devel updated to 0.2.9.4-alpha (includes security fix)
-----------------------------+---------------------------------
Reporter: macports.org@… | Owner: macports-tickets@…
Type: update | Status: new
Priority: Normal | Milestone:
Component: ports | Version:
Resolution: | Keywords: haspatch maintainer
Port: tor-devel |
-----------------------------+---------------------------------
Description changed by larryv@…:
Old description:
> Tor 0.2.9.4-alpha fixes a security hole in previous versions of Tor
> that would allow a remote attacker to crash a Tor client, hidden
> service, relay, or authority. All Tor users should upgrade to this
> version, or to 0.2.8.9. Patches will be released for older versions
> of Tor.
>
> o Major features (security fixes):
> - Prevent a class of security bugs caused by treating the contents
> of a buffer chunk as if they were a NUL-terminated string. At
> least one such bug seems to be present in all currently used
> versions of Tor, and would allow an attacker to remotely crash
> most Tor instances, especially those compiled with extra compiler
> hardening. With this defense in place, such bugs can't crash Tor,
> though we should still fix them as they occur. Closes ticket
> 20384 (TROVE-2016-10-001).
New description:
https://blog.torproject.org/blog/tor-0294-alpha-released-important-fixes
> Tor 0.2.9.4-alpha fixes a security hole in previous versions of Tor
> that would allow a remote attacker to crash a Tor client, hidden
> service, relay, or authority. All Tor users should upgrade to this
> version, or to 0.2.8.9. Patches will be released for older versions of
> Tor.
>
> - Major features (security fixes):
> - Prevent a class of security bugs caused by treating the contents
> of a buffer chunk as if they were a NUL-terminated string. At
> least one such bug seems to be present in all currently used
> versions of Tor, and would allow an attacker to remotely crash
> most Tor instances, especially those compiled with extra compiler
> hardening. With this defense in place, such bugs can't crash Tor,
> though we should still fix them as they occur. Closes ticket 20384
> (TROVE-2016-10-001).
--
--
Ticket URL: <https://trac.macports.org/ticket/52655#comment:3>
MacPorts <https://www.macports.org/>
Ports system for the Mac operating system
More information about the macports-tickets
mailing list