Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 301701 - <net-misc/tor-0.2.1.22: Multiple vulnerabilities (CVE-2010-{0383,0385})
Summary: <net-misc/tor-0.2.1.22: Multiple vulnerabilities (CVE-2010-{0383,0385})
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: x86 Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://archives.seul.org/or/talk/Jan-...
Whiteboard: B4? [noglsa]
Keywords:
: 301703 (view as bug list)
Depends on:
Blocks:
 
Reported: 2010-01-21 11:44 UTC by Marshall Banana
Modified: 2010-03-05 21:25 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marshall Banana 2010-01-21 11:44:54 UTC
the latest version of tor is 0.2.1.22, whereas the latest version in portage is 0.2.1.20-r1... a version dump would be appreciated :-)
because of the patches a simple ebuild rename doesn't work...

also, could i request an ebuild for the unstable version (currently 0.2.2.7-alpha)???

Reproducible: Always

Steps to Reproduce:
1. emerge tor
2. ...
3. no profit

Actual Results:  
install of tor-0.2.1.20-r1

Expected Results:  
install of tor-0.2.1.22
Comment 1 Marshall Banana 2010-01-21 11:49:48 UTC
*** Bug 301703 has been marked as a duplicate of this bug. ***
Comment 2 Jeroen Roovers (RETIRED) gentoo-dev 2010-01-22 01:31:55 UTC
(In reply to comment #0)
> the latest version of tor is 0.2.1.22, whereas the latest version in portage is
> 0.2.1.20-r1...

Keywords in /keeps/gentoo/cvs/gentoo-x86 for net-misc/tor :

            | a a a a h i m m p p s s s s x x 
            | l m m r p a 6 i p p 3 h p p 8 8 
            | p d d m p 6 8 p c c 9   a a 6 6 
            | h 6 6   a 4 k s   6 0   r r   - 
            | a 4 4             4     c c   f 
            |     -                     -   b 
            |     f                     f   s 
            |     b                     b   d 
            |     s                     s     
            |     d                     d     
------------+--------------------------------
0.2.1.19-r2 |   +             + +     +   + ~ 
0.2.1.20-r1 |   ~             ~ ~     ~   ~ ~ 
0.2.1.21    |   ~             ~ ~     ~   ~ ~



# ChangeLog for net-misc/tor
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.190 2010/01/16 11:14:46 fauli Exp $

*tor-0.2.1.21 (16 Jan 2010)

  16 Jan 2010; Christian Faulhammer <fauli@gentoo.org> +tor-0.2.1.21.ebuild:
  version bump, bug 301169 by Tim O'Kelly <bugs_gentoo_org DOT Tim_OKelly AT
  neverbox DOT org>
Comment 3 Ken R 2010-01-22 03:25:23 UTC
Please note email from Tor developer Roger Dingledine dated Wed, 20 Jan 2010:
Subject: Tor Project infrastructure updates in response to security breach

Link to the above email:
http://archives.seul.org/or/talk/Jan-2010/msg00161.html

Due to the breach of the Tor project's three servers in January, the "Tor Project" advises users "should upgrade to Tor 0.2.1.22 or 0.2.2.7-alpha".

Perhaps the severity of this bug should be increased from normal, also.

Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2010-01-22 03:42:48 UTC
Seems to be security related.
Comment 5 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-22 08:20:43 UTC
And it justifies a instant stabilisation.

Arches, please stabilise net-misc/tor-0.2.1.22
Comment 6 Christian Faulhammer (RETIRED) gentoo-dev 2010-01-22 10:49:33 UTC
x86 stable
Comment 7 Brent Baude (RETIRED) gentoo-dev 2010-01-22 18:35:19 UTC
ppc64 done
Comment 8 Raúl Porcel (RETIRED) gentoo-dev 2010-01-30 19:04:55 UTC
sparc stable
Comment 9 Markus Meier gentoo-dev 2010-02-01 19:48:01 UTC
amd64 stable
Comment 10 Joe Jezak (RETIRED) gentoo-dev 2010-02-10 04:06:47 UTC
Marked ppc stable.
Comment 11 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-05 08:31:54 UTC
CVE-2010-0383 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0383):
  Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses
  deprecated identity keys for certain directory authorities, which
  makes it easier for man-in-the-middle attackers to compromise the
  anonymity of traffic sources and destinations.

CVE-2010-0385 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0385):
  Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when
  functioning as a bridge directory authority, allows remote attackers
  to obtain sensitive information about bridge identities and bridge
  descriptors via a dbg-stability.txt directory query.

Comment 12 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-05 08:32:33 UTC
GLSA vote: NO.
Comment 13 Tobias Heinlein (RETIRED) gentoo-dev 2010-03-05 21:25:00 UTC
NO too, closing.