Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 612228

Summary: <net-vpn/tor-0.3.0.8: Integer underflow when comparing malformed tor versions
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: blueness
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1428872
Whiteboard: B3 [noglsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2017-03-10 16:36:54 UTC
From ${URL} :

An integer overflow vulnerability was found in Tor. The application could crash while comparing malformed Tor versions when built with --enable-expensive-hardening.

Upstream bug:

https://trac.torproject.org/projects/tor/ticket/21278

Upstream patches:

https://gitweb.torproject.org/tor.git/commit/?id=a0ef3cf0880e3cd343977b3fcbd0a2e7572f0cb4
https://gitweb.torproject.org/tor.git/commit/?id=194e31057fbf07d6bdf4b62d26e1a9db334e5f1c
Related:
https://gitweb.torproject.org/tor.git/commit/?id=1afc2ed956a35b40dfd1d207652af5b50c295da7
Extra fix:
https://gitweb.torproject.org/tor.git/commit/?id=02e05bd74dbec614397b696cfcda6525562a4675


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Aaron Bauman (RETIRED) gentoo-dev 2017-07-17 01:31:01 UTC
Fix is in 0.3.0.8
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2017-09-10 23:05:30 UTC
Tree is clean.

GLSA Vote: No