-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.3047
                            tor security update
                             21 December 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           tor
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Linux variants
                   Windows
                   OS X
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-1254  

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3741

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running tor check for an updated version of the software for their 
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3741-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
December 20, 2016                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : tor
CVE ID         : CVE-2016-1254
Debian Bug     : 848847

It was discovered that Tor, a connection-based low-latency anonymous
communication system, may read one byte past a buffer when parsing
hidden service descriptors. This issue may enable a hostile hidden
service to crash Tor clients depending on hardening options and malloc
implementation.

For the stable distribution (jessie), this problem has been fixed in
version 0.2.5.12-4.

For the testing (stretch) and unstable (sid) distributions, this
problem has been fixed in version 0.2.9.8-2.

We recommend that you upgrade your tor packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJYWSEgAAoJEBC+iYPz1Z1kFVcH/35p+PQJ9HYlL2n17TCxCvCw
fN6COho2fG4dNu+KAZRoKhy8N/ndGTFiNVM6WDj/J5PutZENzihAur6khefNjKUd
Iz0FpL9/u9oNkvehzXKq5SFFZG0/zgWhURlMnR+71cszaIG6Oz7s7EJpnuYsKKZb
ZbTY2t2NWfBk2m0BQQQ7IbLfzkZdhq9nXVFpcteuuAc5kRSFR6yYlGAVXHO9q4Ej
mIDc7N+Zn8avRuxt+O5/oAi7IMZJl6Sw5o8aW98m3fFmgR/iKLZ6AoaYKWYihRed
88O4LQcZUrZMVXjFdCXeRAgpbeuYMZ97ksr6m/FStyx40FioMt8GDuU48Daugfw=
=15sj
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GBub
-----END PGP SIGNATURE-----