Package: tor
Version: 0.0.9.10-1
Severity: normal

The Tor 0.1.0.10 release from a few days ago includes a fix for a bug
that might allow an attacker to read arbitrary memory (maybe even keys)
from an exit server's process space. We haven't heard any reports of
exploits yet, but hey.

Another thing is that the new version allow to use HTTP and HTTPS proxy in order
to access to the Internet.

This is a major and important functionality.

Please upgrade the tor package.

Thanks you very much,
Romain.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-1-686
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages tor depends on:
ii  adduser                     3.64         Add and remove users and groups
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libssl0.9.7                 0.9.7g-1     SSL shared libraries
ii  python                      2.3.5-3      An interactive high-level object-o
ii  tsocks                      1.8beta5-2   transparent network access through
ii  zlib1g                      1:1.2.2-4    compression library - runtime

Versions of packages tor recommends:
ii  privoxy                       3.0.3-4    Privacy enhancing HTTP Proxy
ii  socat                         1.4.2.0-1  multipurpose relay for bidirection

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to