Summary: | <net-misc/tor-0.2.3.25: Denial of Service Vulnerability (CVE-2012-5573) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 447254 |
Description
Agostino Sarubbo
2012-11-26 15:28:28 UTC
@maintainer, can we stabilize 0.2.3.25 ? (In reply to comment #1) > @maintainer, can we stabilize 0.2.3.25 ? I knew this was coming, so I got everything ready. Arch teams target KEYWORDS="~amd64 ~arm ~ppc ~ppc64 ~sparc ~x86" I'll take care of arm, ppc and ppc64 in a minute. stable on arm ppc ppc64 amd64 stable x86 stable @sparc. I had USE=nat-pmp and USE=upnp masked for net-misc/tor across all arches and just unmasked them for amd64 and x86. Testing on arm, mips, ppc and pp64 showed that they now work there so I unmasked them for *all* arches. When stabilizing tor for sparc, please also test net-libs/libnatpmp and net-libs/miniupnpc and either keyword/stabilize or mask those flags. sparc stable Thanks, everyone. GLSA vote: yes. Vote: yes. GLSA request filed. CVE-2012-5573 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573): The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command. This issue was resolved and addressed in GLSA 201301-03 at http://security.gentoo.org/glsa/glsa-201301-03.xml by GLSA coordinator Sean Amoss (ackle). |