CVE-2012-3519

Publication date 26 August 2012

Last updated 24 July 2024


Ubuntu priority

routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.

Status

Package Ubuntu Release Status
tor 17.04 zesty
Fixed 0.2.3.22-rc-1
16.10 yakkety
Fixed 0.2.3.22-rc-1
16.04 LTS xenial
Fixed 0.2.3.22-rc-1
15.10 wily
Fixed 0.2.3.22-rc-1
15.04 vivid
Fixed 0.2.3.22-rc-1
14.10 utopic
Fixed 0.2.3.22-rc-1
14.04 LTS trusty
Fixed 0.2.3.22-rc-1
13.10 saucy
Fixed 0.2.3.22-rc-1
13.04 raring
Fixed 0.2.3.22-rc-1
12.10 quantal
Fixed 0.2.3.22-rc-1
12.04 LTS precise Ignored end of life
11.10 oneiric Ignored end of life
11.04 natty Ignored end of life
10.04 LTS lucid Not in release
8.04 LTS hardy Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
tor