Delivery-Date: Fri, 12 Feb 2016 00:09:07 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id ADF411E06C9;
	Fri, 12 Feb 2016 00:08:19 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 6DE3838E11;
	Fri, 12 Feb 2016 05:08:02 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D6CF738D3E
 for <tor-talk@lists.torproject.org>; Fri, 12 Feb 2016 05:07:59 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id L-Ex9FFTp2QA for <tor-talk@lists.torproject.org>;
 Fri, 12 Feb 2016 05:07:59 +0000 (UTC)
Received: from mail-lf0-x229.google.com (mail-lf0-x229.google.com
 [IPv6:2a00:1450:4010:c07::229])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 849B038D39
 for <tor-talk@lists.torproject.org>; Fri, 12 Feb 2016 05:07:56 +0000 (UTC)
Received: by mail-lf0-x229.google.com with SMTP id m1so45207116lfg.0
 for <tor-talk@lists.torproject.org>; Thu, 11 Feb 2016 21:07:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:date:message-id:subject:from:to:content-type;
 bh=tIVVRLDsEXINxK1Q25cs7WF7DACcDR72Q1+ceaoRdFc=;
 b=u5cTQzfrwK2l4NKFs76n39wF+qxcEIcSY4ZwY7EpkXEqWgLVRhImM8MBd8Ulh7R7fR
 J73PLhXEV5k20EgzRbRXvUNoZNsijnNZJvNKEKn0+1K3/MYyJB1PL2JDUXL0iWVDPShr
 C9OCLMMALnSqyRfT+L4+c//nlLd/VgQRmWrjkcQaFhyPv25gqQRXOh9u7AdRuqXAP8vm
 1t4zG6kZ9+EH+L7COmEsLuqzfCLKkatZkG7Tjq5+3AACHJVcFweUOTm+Ca2P+RbMzb90
 751sy2P/ifrtRoju0e0jvUDnzxTo2BCFxkxQ5rEODUbp3OILfbRL58sV/W07NoDmoOBr
 dvFQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:mime-version:date:message-id:subject:from:to
 :content-type;
 bh=tIVVRLDsEXINxK1Q25cs7WF7DACcDR72Q1+ceaoRdFc=;
 b=c46LbRXB0rlh4C4GcLpc7BKKAnGTwv610y3cJwKg0WKeoXBbkeyIWKpgqN6wc8xriy
 AMtUeHyAu9Th8O7+EyhFdp9z9G4xOKK/CFK7CCC5MjdNaNK1RKijD96EtQ3U4et7j3Rg
 VcUyZ9JndNbzEb04ZoVfZFIRLXUjDhbr4e9wkOje3C+f4rzG78nAoalOXTCycWOUAnGk
 RhA/Bn0lDcDJiVd/rW5JfWQf0tEUW9hjPeZ5DryRHftkbRVNFP5Q163Zxt51c6urKknV
 0USxQG5pMXhZx/u1l9UKYnDFq1hsclHTmAFgJSyVl01VsUryjrIUhcIBnBcQckEl1w51
 oWrg==
X-Gm-Message-State: AG10YOSOMb2ZYqwz0l0vjhHc+DRfePbjaf883FWOK7fy5O7glL6tTYJQkYtw4f57Zbi5lHN7CKtwItzeU/Y+Lg==
MIME-Version: 1.0
X-Received: by 10.25.18.220 with SMTP id 89mr20712406lfs.127.1455253672659;
 Thu, 11 Feb 2016 21:07:52 -0800 (PST)
Received: by 10.112.50.179 with HTTP; Thu, 11 Feb 2016 21:07:52 -0800 (PST)
Date: Fri, 12 Feb 2016 00:07:52 -0500
Message-ID: <CAJ5w9HXa0gYkYxzOPOVxMCiuab=mnAhmRa-V2142chp5b2E5Jw@mail.gmail.com>
From: Soul Plane <soulplane11@gmail.com>
To: tor-talk@lists.torproject.org
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Is Tor Browser 5.5.1 vulnerable to any of the graphite
	font vulnerabilities?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

I received a Firefox ESR vulnerability notice today [1] that basically says
some vulnerabilities in libgraphite were fixed in 38.6.1, released today.
The digital signature is for the 10th. Some of the issues were first
disclosed on Feb 5 [2] which is around Tor Browser 5.5.1 was released. I'm
not sure when the other smart font issue was first disclosed.

In the tor browser blog comments on the 10th someone said graphite font
rendering is vulnerable [3] but I can't tell if he's talking about in 5.5.1
or before.

I cannot find a list of vulnerability notices for Tor Browser (why not?
seems like it would be good to have). I assume it somewhat mirrors Firefox
ESR. Based on the information about this, which looks exploitable, I would
like to know if Tor Browser 5.5.1 is vulnerable. Thanks


[1]: https://www.mozilla.org/en-US/security/advisories/mfsa2016-14/
[2]:
http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
[3]:
https://blog.torproject.org/blog/tor-browser-551-released#comment-155968
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

