Anonymizing Linux: Tails 6.12 closes deanonymization gap

Security vulnerabilities in the anonymizing Linux distribution Tails allow attackers to deanonymize users. Tails 6.12 stops this.

listen Print view
Tails 6.12 on notebook display

(Image: heise online / dmk)

2 min. read

An updated version of the anonymizing Linux Tails has been released. In it, the developers close security gaps that allow attackers to deanonymize users.

In the version announcement, the Tails developers write that attackers could monitor the Tor circuits. To do this, they must have previously taken control of an application in Tails and can then abuse vulnerabilities in "Onion Circuits" and in the "Tor Browser" wrapper that lead to deanonymization. A second vulnerability allows attackers to change the persistent storage settings. The Tails project does not discuss in detail what this takeover of control via apps could look like.

The vulnerabilities were discovered during a security audit by Radically Open Security. Version 6.12 and newer of Tails fixes them. Other new features have also been included in the new version: The "About Tails" dialog now has a button to search for upgrades.

Videos by heise

The keyboard shortcut "Ctrl "+"Alt "+"T" directly opens a terminal window. The central Tor browser has been updated to version 14.0.5, Thunderbird has been updated to version 128.6.0esr. Python code now runs completely in isolated mode again, the welcome screen no longer freezes when activating persistent storage, time synchronization when starting Tor is now more reliable, and Tails now displays an error message when upgrading persistent storage encryption to LUKS2 fails. What remains is the problem that the "Configure" and "Show Log" buttons do not work when errors occur during the installation of additional software from the persistent storage.

The current version of the anonymizing Linux "for your pocket" is available as a download for installation on USB sticks to take with you and as an ISO image for burning to DVD on the Tails website.

The maintainers have already patched critical security vulnerabilities in Tails 6.11 from January. Attackers could have infiltrated malicious upgrades via a small detour through the integrated updater and gained permanent control over vulnerable Tails systems.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.