FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-12-18 19:03:49 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
31c09848-1829-11e4-bf04-60a44c524f57tor -- traffic confirmation attack

The Tor Project reports:

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.


Discovery 2014-07-30
Entry 2014-07-30
tor
< 0.2.4.23

tor-devel
< 0.2.5.6.a

https://lists.torproject.org/pipermail/tor-announce/2014-July/000094.html
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
CVE-2014-5117
0b9f4b5e-5d82-11e7-85df-14dae9d5a9d2tor -- security regression

The Tor Project reports:

Tor 0.3.0.9 fixes a path selection bug that would allow a client to use a guard that was in the same network family as a chosen exit relay. This is a security regression; all clients running earlier versions of 0.3.0.x or 0.3.1.x should upgrade to 0.3.0.9 or 0.3.1.4-alpha.


Discovery 2017-06-29
Entry 2017-06-30
tor
< 0.3.0.9

tor-devel
< 0.3.1.4.a

https://blog.torproject.org/blog/tor-0309-released-security-update-clients
https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients
https://lists.torproject.org/pipermail/tor-announce/2017-June/000133.html
CVE-2017-0377