Two vulnerabilities have been found in Tor, the worst of which can allow remote attackers to cause a Denial of Service condition.
Package | net-misc/tor on all architectures |
---|---|
Affected versions | < 0.2.6.7 |
Unaffected versions | >= 0.2.6.7 |
Tor is an implementation of second generation Onion Routing, a connection-oriented anonymizing communication service.
Tor does not handle data correctly when specifically crafted data is sent, and also fails to properly verify a descriptor provided by a hidden service directory.
A remote attacker could cause a Denial of Service condition in both a Tor client or a Tor server.
There is no known workaround at this time.
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.6.7"
Release date
July 06, 2015
Latest revision
July 06, 2015: 1
Severity
normal
Exploitable
remote
Bugzilla entries