diff options
author | Peter Palfrader <peter@palfrader.org> | 2006-01-25 12:26:21 +0000 |
---|---|---|
committer | Peter Palfrader <peter@palfrader.org> | 2006-01-25 12:26:21 +0000 |
commit | a2b6a50b9554227bf163d79f68b5d6d7e7b63351 (patch) | |
tree | 978ae04d37a0147699fbf3e74b502d2397f697ba | |
parent | 768e9f3390122415962302f68a1be93369fae69e (diff) | |
download | tor-a2b6a50b9554227bf163d79f68b5d6d7e7b63351.tar.gz tor-a2b6a50b9554227bf163d79f68b5d6d7e7b63351.zip |
The reading-arbitrary-memory bug in June had a CVE too
svn:r5866
-rw-r--r-- | changelog | 3 |
1 files changed, 2 insertions, 1 deletions
@@ -202,7 +202,8 @@ tor (0.0.9.10-1) unstable; urgency=high upload of the 0.0.9.x tree: - Refuse relay cells that claim to have a length larger than the maximum allowed. This prevents a potential attack that could read - arbitrary memory (e.g. keys) from an exit server's process. + arbitrary memory (e.g. keys) from an exit server's process + (CVE-2005-2050). -- Peter Palfrader <weasel@debian.org> Thu, 16 Jun 2005 22:56:11 +0200 |