First published: Fri Jan 17 2014(Updated: )
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <=0.2.4.19 | |
Torproject Tor | =0.2.4.1-alpha | |
Torproject Tor | =0.2.4.2-alpha | |
Torproject Tor | =0.2.4.3-alpha | |
Torproject Tor | =0.2.4.4-alpha | |
Torproject Tor | =0.2.4.5-alpha | |
Torproject Tor | =0.2.4.6-alpha | |
Torproject Tor | =0.2.4.7-alpha | |
Torproject Tor | =0.2.4.8-alpha | |
Torproject Tor | =0.2.4.9-alpha | |
Torproject Tor | =0.2.4.10-alpha | |
Torproject Tor | =0.2.4.11-alpha | |
Torproject Tor | =0.2.4.12-alpha | |
Torproject Tor | =0.2.4.13-alpha | |
Torproject Tor | =0.2.4.14-alpha | |
Torproject Tor | =0.2.4.15-rc | |
Torproject Tor | =0.2.4.16-rc | |
Torproject Tor | =0.2.4.17-rc | |
Torproject Tor | =0.2.4.18-rc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.