Lucene search

K
osvGoogleOSV:DLA-754-1
HistoryDec 20, 2016 - 12:00 a.m.

tor - security update

2016-12-2000:00:00
Google
osv.dev
10

EPSS

0.041

Percentile

92.2%

It was discovered that Tor, a connection-based low-latency anonymous
communication system, may read one byte past a buffer when parsing
hidden service descriptors. This issue may enable a hostile hidden
service to crash Tor clients depending on hardening options and malloc
implementation.

For Debian 7 Wheezy, these problems have been fixed in version
0.2.4.27-3.

We recommend that you upgrade your tor packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS&gt;