Debian Security Advisory DSA-4871-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
March 16, 2021 https://www.debian.org/security/faq
Package : tor
CVE ID : CVE-2021-28089 CVE-2021-28090
Two vulnerabilities were discovered in Tor, a connection-based
low-latency anonymous communication system, which could lead to
excessive CPU usage or cause a directory authority to crash.
For the stable distribution (buster), these problems have been fixed in
version 0.3.5.14-1.
We recommend that you upgrade your tor packages.
For the detailed security status of tor please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/tor
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | mipsel | tor-dbgsym | < 0.3.5.14-1 | tor-dbgsym_0.3.5.14-1_mipsel.deb |
Debian | 10 | s390x | tor-dbgsym | < 0.3.5.14-1 | tor-dbgsym_0.3.5.14-1_s390x.deb |
Debian | 10 | amd64 | tor-dbgsym | < 0.3.5.14-1 | tor-dbgsym_0.3.5.14-1_amd64.deb |
Debian | 10 | arm64 | tor | < 0.3.5.14-1 | tor_0.3.5.14-1_arm64.deb |
Debian | 10 | mips | tor-dbgsym | < 0.3.5.14-1 | tor-dbgsym_0.3.5.14-1_mips.deb |
Debian | 10 | i386 | tor | < 0.3.5.14-1 | tor_0.3.5.14-1_i386.deb |
Debian | 10 | arm64 | tor-dbgsym | < 0.3.5.14-1 | tor-dbgsym_0.3.5.14-1_arm64.deb |
Debian | 10 | i386 | tor-dbgsym | < 0.3.5.14-1 | tor-dbgsym_0.3.5.14-1_i386.deb |
Debian | 10 | ppc64el | tor | < 0.3.5.14-1 | tor_0.3.5.14-1_ppc64el.deb |
Debian | 10 | armel | tor | < 0.3.5.14-1 | tor_0.3.5.14-1_armel.deb |