Summary: | <net-misc/tor-0.2.2.38 : Multiple vulnerabilites (CVE-2012-{3517,3518,3519}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness, bugzie |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2012/08/21/3 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-08-21 12:49:46 UTC
@blueness, can 0.2.2.38 go to stable? (In reply to comment #1) > @blueness, can 0.2.2.38 go to stable? Yes. (In reply to comment #2) > (In reply to comment #1) > > @blueness, can 0.2.2.38 go to stable? > > Yes. Thank you. Arches, please test and mark stable: =net-misc/tor-0.2.2.38 Target keywords : "amd64 arm ppc ppc64 sparc x86" x86 stable amd64 stable Stable arm ppc ppc64 sparc stable Thanks, folks. GLSA Vote: yes. CVE-2012-3519 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519): routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack. CVE-2012-3518 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518): The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document. CVE-2012-3517 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517): Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests. GLSA vote: yes. GLSA request filed. This issue was resolved and addressed in GLSA 201301-03 at http://security.gentoo.org/glsa/glsa-201301-03.xml by GLSA coordinator Sean Amoss (ackle). |