CVE-2011-4895
Published: 23 December 2011
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
Priority
Status
Package | Release | Status |
---|---|---|
tor Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(0.2.2.35-1)
|
|
quantal |
Not vulnerable
(0.2.2.35-1)
|
|
raring |
Not vulnerable
(0.2.2.35-1)
|
|
upstream |
Not vulnerable
(0.2.2.35-1)
|