CVE-2012-3519

Priority
Description
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for
relay-list iteration depending on which relay is chosen, which might allow
remote attackers to obtain sensitive information about relay selection via
a timing side-channel attack.
Notes
Package
Source: tor (LP Ubuntu Debian)
Upstream:released (0.2.2.38)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):released (0.2.3.22-rc-1)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.2.3.22-rc-1)
Patches:
Upstream:https://gitweb.torproject.org/tor.git/commitdiff/308f6dad20675c42b29862f4269ad1fbfb00dc9a
Upstream:https://gitweb.torproject.org/tor.git/commitdiff/d48cebc5e498b0ae673635f40fc57cdddab45d5b
More Information

Updated: 2020-09-10 02:11:19 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)