Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 Jun 2017 22:48:55 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 220372] security/tor-devel: update to 0.3.1.4-alpha (security: CVE-2017-0377)
Message-ID:  <bug-220372-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220372

            Bug ID: 220372
           Summary: security/tor-devel: update to 0.3.1.4-alpha (security:
                    CVE-2017-0377)
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: freebsd-vheg@riseup.net
                CC: yuri@rawbw.com
             Flags: maintainer-feedback?(yuri@rawbw.com)
                CC: yuri@rawbw.com

This update fixes a problem in path selection where a tor client uses
multiple relays from a single operator.



https://dist.torproject.org/tor-0.3.1.4-alpha.tar.gz

https://gitweb.torproject.org/tor.git/commit/?id=3D665baf5ed5c6186d973c46cd=
ea165c0548027350

https://trac.torproject.org/projects/tor/ticket/22753#comment:3

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-220372-13>