diff options
author | Peter Palfrader <peter@palfrader.org> | 2006-01-25 12:26:21 +0000 |
---|---|---|
committer | Peter Palfrader <peter@palfrader.org> | 2006-01-25 12:26:21 +0000 |
commit | 17e0d9f238ec3649ed253d7e5eb60b333f7ff47a (patch) | |
tree | ad6aac39a1bc425d37873d273f1a9812d8d3a9b5 /debian/changelog | |
parent | ef8787b7ee834ca72e23f6e62dc025a41d8258fd (diff) | |
download | tor-17e0d9f238ec3649ed253d7e5eb60b333f7ff47a.tar tor-17e0d9f238ec3649ed253d7e5eb60b333f7ff47a.tar.gz |
The reading-arbitrary-memory bug in June had a CVE too
svn:r5866
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/debian/changelog b/debian/changelog index d450c6e44..53739d613 100644 --- a/debian/changelog +++ b/debian/changelog @@ -202,7 +202,8 @@ tor (0.0.9.10-1) unstable; urgency=high upload of the 0.0.9.x tree: - Refuse relay cells that claim to have a length larger than the maximum allowed. This prevents a potential attack that could read - arbitrary memory (e.g. keys) from an exit server's process. + arbitrary memory (e.g. keys) from an exit server's process + (CVE-2005-2050). -- Peter Palfrader <weasel@debian.org> Thu, 16 Jun 2005 22:56:11 +0200 |