File: tor.NEWS

package info (click to toggle)
tor 0.4.8.16-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 50,308 kB
  • sloc: ansic: 314,413; sh: 7,386; python: 1,829; makefile: 620; perl: 249; pascal: 141
file content (16 lines) | stat: -rw-r--r-- 697 bytes parent folder | download | duplicates (18)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
tor (0.2.0.26-rc-1) experimental; urgency=critical

  * weak cryptographic keys

    It has been discovered that the random number generator in Debian's
    openssl package is predictable.  This is caused by an incorrect
    Debian-specific change to the openssl package (CVE-2008-0166).  As a
    result, cryptographic key material may be guessable.

    See Debian Security Advisory number 1571 (DSA-1571) for more information:
    http://lists.debian.org/debian-security-announce/2008/msg00152.html

    If you run a Tor server using this package please see
    /var/lib/tor/keys/moved-away-by-tor-package/README.REALLY

 -- Peter Palfrader <weasel@debian.org>  Tue, 13 May 2008 12:49:05 +0200