Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#12903 - tor 0.2.0.32 is vulnerable to a remote code execution bug
Attached to Project:
Arch Linux
Opened by Rorschach (Rorschach) - Friday, 23 January 2009, 11:47 GMT
Last edited by Douglas Soares de Andrade (dsa) - Monday, 02 February 2009, 01:59 GMT
Opened by Rorschach (Rorschach) - Friday, 23 January 2009, 11:47 GMT
Last edited by Douglas Soares de Andrade (dsa) - Monday, 02 February 2009, 01:59 GMT
|
DetailsDescription:
tor 0.2.0.32 is vulnarable to a heap corrpution which can allow an attacker to remotly execute code with the permissions of the user which is running tor. Fix: Upgrade package to the latest version 0.2.0.33. More Information: https://svn.torproject.org/svn/tor/trunk/ReleaseNotes Upgraded PKGBUILD in the attachment: |
This task depends upon
Closed by Douglas Soares de Andrade (dsa)
Monday, 02 February 2009, 01:59 GMT
Reason for closing: Fixed
Additional comments about closing: Upgraded to the latest version.
Monday, 02 February 2009, 01:59 GMT
Reason for closing: Fixed
Additional comments about closing: Upgraded to the latest version.
PKGBUILD
Reasons for not being a bug:
...
# A bug already fixed upstream but not in Arch because the package is not up-to-date.