[tor-relays] Keep your Tor relays updated!
tagnaq
tagnaq at gmail.com
Mon May 16 20:20:27 UTC 2011
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 05/15/2011 09:19 PM, Sebastian Hahn wrote:
> Before you contact anyone appearing to run 0.2.2.19-alpha,
> check their descriptor and the git part of the version string
> therein
vulnerable (CVE-2011-0427):
Tor 0.2.2.19-alpha (git-e57cb6b9762a2f94) on Linux i686 (laurel, hardy)
safe (CVE-2011-0427):
Tor 0.2.2.19-alpha (git-35fcec38809f9805) on Linux i686 (ides)
Tor 0.2.2.19-alpha (git-e0d5a6e184967358) on Linux x86_64 (wii)
Tor 0.2.2.19-alpha (git-aba7bb705a69697a) on Linux x86_64 (Amunet)
Regarding contacting operators:
I'll try to reach a few high bandwidth vuln. relay operators to reduce
"vulnerable bandwidth" without sending many emails.
-----BEGIN PGP SIGNATURE-----
iF4EAREKAAYFAk3RhwsACgkQyM26BSNOM7aESwD+Is/m0TytdV5jGdNF9A3nxJ30
EMvNTnqO48Dww9fUJtUA/2/47nynqqLT9AwzR1jod2VQ/s5VnEhHbk/46wGXqyCw
=aHHB
-----END PGP SIGNATURE-----
More information about the tor-relays
mailing list