The Tor project has released 0.2.2.34  which corrects the following flaws:
A design flaw in Tor could allow a malicious relay server to learn certain information that they should not be able to learn. A malicious relay that a user connected to directly could learn which other relays that user is connected to directly. Combining this with other attacks, this flaw could lead to de-anonymizing the user (CVE-2011-2768). ,,
In 0.2.2.34, bridges now refuse CREATE or CREATE_FAST cells on OR connections that they initiated. Previously, relays could distinguish incoming bridge connections from client connections, creating another avenue for enumerating bridges (CVE-2011-2769). 
(I may be slightly off on the git commits, particular for  and  which look like they are mitigation patches for dealing with unpatched clients; I believe that that  is the actual fix for CVE-2011-2768).
Created tor tracking bugs for this issue
Affects: epel-5 [bug 749841]
Affects: fedora-all [bug 749842]
tor-0.2.1.31-1500.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
tor-0.2.2.34-1600.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
all branches were upgraded a long time ago