FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-25 21:13:12 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
31c09848-1829-11e4-bf04-60a44c524f57tor -- traffic confirmation attack

The Tor Project reports:

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.


Discovery 2014-07-30
Entry 2014-07-30
tor
< 0.2.4.23

tor-devel
< 0.2.5.6.a

https://lists.torproject.org/pipermail/tor-announce/2014-July/000094.html
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
CVE-2014-5117
0b9f4b5e-5d82-11e7-85df-14dae9d5a9d2tor -- security regression

The Tor Project reports:

Tor 0.3.0.9 fixes a path selection bug that would allow a client to use a guard that was in the same network family as a chosen exit relay. This is a security regression; all clients running earlier versions of 0.3.0.x or 0.3.1.x should upgrade to 0.3.0.9 or 0.3.1.4-alpha.


Discovery 2017-06-29
Entry 2017-06-30
tor
< 0.3.0.9

tor-devel
< 0.3.1.4.a

https://blog.torproject.org/blog/tor-0309-released-security-update-clients
https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients
https://lists.torproject.org/pipermail/tor-announce/2017-June/000133.html
CVE-2017-0377
38bdf10e-2293-11e0-bfa4-001676740879tor -- remote code execution and crash

The Tor Project reports:

A remote heap overflow vulnerability that can allow remote code execution. Other fixes address a variety of assert and crash bugs, most of which we think are hard to exploit remotely. All Tor users should upgrade.


Discovery 2011-01-15
Entry 2011-01-17
tor
< 0.2.1.29

tor-devel
< 0.2.2.21.a

45832
CVE-2011-0427
ports/154099
http://archives.seul.org/or/announce/Jan-2011/msg00000.html
https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog
https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ChangeLog
80af2677-d6c0-11e2-8f5e-001966155beator -- guard discovery

The Tor Project reports:

Disable middle relay queue overfill detection code due to possible guard discovery attack


Discovery 2013-06-15
Entry 2013-06-16
tor-devel
< 0.2.4.13.a_1

https://trac.torproject.org/projects/tor/ticket/9072