{"id":"MGASA-2014-0312","summary":"Updated tor package fixes security vulnerability","details":"Tor before 0.2.4.23 maintains a circuit after an inbound RELAY_EARLY cell is\nreceived by a client, which makes it easier for remote attackers to conduct\ntraffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY\ncells as a means of communicating information about hidden service names\n(CVE-2014-5117).\n","modified":"2026-04-16T06:23:33.102020151Z","published":"2014-08-05T20:08:48Z","upstream":["CVE-2014-5117"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0312.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13824"},{"type":"ADVISORY","url":"http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5117"},{"type":"WEB","url":"https://lists.torproject.org/pipermail/tor-announce/2014-July/000093.html"},{"type":"ADVISORY","url":"https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack"}],"affected":[{"package":{"name":"tor","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/tor?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.4.23-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0312.json"}},{"package":{"name":"tor","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/tor?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.4.23-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0312.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}