Common Vulnerabilities and Exposures assigned an identifier CVE-2010-1676 to the following vulnerability: Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. References: [1] http://archives.seul.org/or/announce/Dec-2010/msg00000.html [2] http://blog.torproject.org/blog/tor-02128-released-security-patches [3] http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches [4] https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog [5] http://www.securityfocus.com/bid/45500 [6] http://securitytracker.com/id?1024910 [7] http://secunia.com/advisories/42536 [8] http://www.vupen.com/english/advisories/2010/3290
The updated (v0.2.1.28 version based) version of Tor is already present in Fedora -testing repository. Once the prescribed testing phase is finished, the particular packages will be pushed to -stable repository. -- This issue affects the version of the tor package, as present within EPEL-5 repository. Please schedule a rebase.
Created tor tracking bugs for this issue Affects: epel-5 [bug 671263]
fixed long time ago