# [Security audit of Persistent Storage and Tor
integration](
https://tails.boum.org/news/audit_by_ROS/index.en.html)
In March 2023, [Radically Open
Security](
https://www.radicallyopensecurity.com/) conducted a security audit
on the major improvements that we released in [Tails
5.8](
https://tails.boum.org/news/version_5.8/index.en.html) (December 2022) on
the Persistent Storage, the Unsafe Browser, and the Wayland integration.
To better protect our users, we addressed most of the security vulnerabilities
as soon as they were discovered and reported to us, without waiting for the
audit to be complete and public. We can now share with your the [final
report](
https://gitlab.tails.boum.org/tails/tails/uploads/df935595f41faa687805136a6bfa2910/tails-
ros-penetration-test-report-1-2.pdf).
We are proud of the conclusion of the auditors:
> **_Overall, the Tails operating system left a solid impression and addressed
> most of the concerns of an average user in need of anonymity._**
>
> _This is particularly evident in the isolation of various components by the
> developers. For example, the configured AppArmor rules often prevented a
> significant impact of the found vulnerabilities. Shifting to Wayland was a
> good decision, as it provides more security by isolating individual GUI
> applications._
>
> _All in all, no serious vulnerabilities were found through the integration
> into Wayland. Unsafe Browser and Persistent Storage should now be less
> vulnerable to attack, as all vulnerabilities have been fixed._
The auditors found 6 _High_ , 1 _Moderate_ , 3 _Low_ -severity issues. Another
issue was fixed before the actual impact was assessed and so marked as having
_Unknown_ severity.
We fixed all these issues as soon as possible and before making them public on
our GitLab. The last issue was fixed in 5.14, 3 weeks after it was reported to
us.
As good as the results of this audit are, they also serve as a reminder that
no software is ever 100% secure and that every release of Tails can fix
critical security vulnerabilities. Your best protection against all kinds of
attack is to keep your Tails up-to-date.
Because at Tails we believe that transparency is key to building trust, all
the code of our software is public and the results of this audit as well. You
can find below a summary of all the issues and their fixes.
# Detailed findings
## Tor integration
ID| Issue| Description| Impact| Status| Release
---|---|---|---|---|---
TLS-012| [#19585](
https://gitlab.tails.boum.org/tails/tails/-/issues/19585)|
Leak clear IP as low-privileged user amnesia| High| Fixed| 5.12
TLS-013| [#19594](
https://gitlab.tails.boum.org/tails/tails/-/issues/19594)|
Local privilege escalation to Tor Connection sandbox| High| Fixed| 5.12
TLS-014| [#19595](
https://gitlab.tails.boum.org/tails/tails/-/issues/19595)|
Local privilege escalation to Tor Browser sandbox| Moderate| Fixed| 5.13
TLS-017| [#19610](
https://gitlab.tails.boum.org/tails/tails/-/issues/19610)|
Insecure permissions of chroot overlay| Unknown| Fixed| 5.13
## Persistent Storage
ID| Issue| Description| Impact| Status| Release
---|---|---|---|---|---
TLS-003| [#19546](
https://gitlab.tails.boum.org/tails/tails/-/issues/19546)|
Local privilege escalation in Persistent folder activation hook| High| Fixed|
5.11
TLS-004| [#19547](
https://gitlab.tails.boum.org/tails/tails/-/issues/19547)|
Symlink attack in Persistent folder deactivation hook| Low| Fixed| 5.11
TLS-005| [#19548](
https://gitlab.tails.boum.org/tails/tails/-/issues/19548)|
Local privilege escalation in GnuPG feature activation hook| High| Fixed| 5.11
## Core
ID| Issue| Description| Impact| Status| Release
---|---|---|---|---|---
TLS-001| [#19464](
https://gitlab.tails.boum.org/tails/tails/-/issues/19464)|
Local privilege escalation in tails-shell-library| High| Fixed| 5.11
TLS-009| [#19599](
https://gitlab.tails.boum.org/tails/tails/-/issues/19599)|
Man-in-the-middle attack on onion-grater service| Low| Fixed| 5.13
TLS-011| [#19576](
https://gitlab.tails.boum.org/tails/tails/-/issues/19576)|
Limited path traversal in tails-documentation| Low| Fixed| 5.13
TLS-019| [#19677](
https://gitlab.tails.boum.org/tails/tails/-/issues/19677)|
Local privilege escalation in tailslib leads to arbitrary file read| High|
Fixed| 5.14
URL: <
https://tails.boum.org/news/audit_by_ROS/index.en.html>
--
Tails News
https://www.autistici.org/mailman/listinfo/amnesia-news
To unsubscribe, send an empty email to amnesia-news-unsubscribe@???.