This release is an emergency release to fix an important security vulnerability in Tor.
Changes and updates
Update the Tor client to 0.4.8.9, which fixes the TROVE-2023-006 vulnerability.
The details of TROVE-2023-006 haven't been disclosed by the Tor Project to leave time for users to upgrade before revealing more. We only know that the Tor Project describes TROVE-2023-006 as a " remote triggerable assert on onion services".
Our team thinks that this vulnerability could affect Tails users who are creating onion services from their Tails, for example when sharing files or publishing a website using OnionShare.
This vulnerability might allow an attacker who already knows your OnionShare address to make your Tor client crash. A powerful attacker might be able to further exploit this crash to reveal your IP address.
This analysis is only a hypothesis because our team doesn't have access to more details about this vulnerability. Still, we are releasing this emergency release as a precaution.
OnionShare is the only application included in Tails that creates onion services. You are not affected by this vulnerability if you don't use OnionShare in Tails and only use Tails to connect to onion services and don't create onion services using Additional Software.
More details about TROVE-2023-006 will be available on the Tor issue #40883 sometime after the release.
For more details, read our changelog.
None specific to this release.
See the list of long-standing issues.
Tails 5.19.1 has been released to fix an important security vulnerability in Tor.