Package: tor Version: 0.0.9.10-1 Severity: normal The Tor 0.1.0.10 release from a few days ago includes a fix for a bug that might allow an attacker to read arbitrary memory (maybe even keys) from an exit server's process space. We haven't heard any reports of exploits yet, but hey.
Another thing is that the new version allow to use HTTP and HTTPS proxy in order to access to the Internet. This is a major and important functionality. Please upgrade the tor package. Thanks you very much, Romain. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11-1-686 Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Versions of packages tor depends on: ii adduser 3.64 Add and remove users and groups ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libssl0.9.7 0.9.7g-1 SSL shared libraries ii python 2.3.5-3 An interactive high-level object-o ii tsocks 1.8beta5-2 transparent network access through ii zlib1g 1:1.2.2-4 compression library - runtime Versions of packages tor recommends: ii privoxy 3.0.3-4 Privacy enhancing HTTP Proxy ii socat 1.4.2.0-1 multipurpose relay for bidirection -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

