Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 349312 (CVE-2010-1676) - <net-misc/tor-0.2.1.28: remote heap overflow (CVE-2010-1676)
Summary: <net-misc/tor-0.2.1.28: remote heap overflow (CVE-2010-1676)
Status: RESOLVED FIXED
Alias: CVE-2010-1676
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: https://blog.torproject.org/blog/tor-...
Whiteboard: B1 [glsa]
Keywords:
: 346759 386211 (view as bug list)
Depends on:
Blocks:
 
Reported: 2010-12-21 20:06 UTC by cnu
Modified: 2011-10-14 23:24 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description cnu 2010-12-21 20:06:40 UTC
"Fix a remotely exploitable bug that could be used to crash instances of Tor remotely by overflowing on the heap. Remote-code execution hasn't been confirmed, but can't be ruled out. Everyone should upgrade. Bugfix on the 0.1.1 series and later."
saw this on the twitter thing. no idea what it is.

Reproducible: Always
Comment 1 Christian Faulhammer (RETIRED) gentoo-dev 2010-12-23 07:25:07 UTC
*** Bug 346759 has been marked as a duplicate of this bug. ***
Comment 2 Christian Faulhammer (RETIRED) gentoo-dev 2010-12-23 07:35:24 UTC
Thanks for the pointer.

Arches please stabilise net-misc/tor-0.2.1.28.
Target: "amd64 arm ppc ppc64 sparc x86 ~x86-fbsd"
Comment 3 Agostino Sarubbo gentoo-dev 2010-12-23 10:26:34 UTC
amd64 ok
Comment 4 Christian Faulhammer (RETIRED) gentoo-dev 2010-12-25 19:38:18 UTC
x86 stable
Comment 5 Markos Chandras (RETIRED) gentoo-dev 2010-12-26 14:15:32 UTC
amd64 done. Thanks Agostino
Comment 6 Raúl Porcel (RETIRED) gentoo-dev 2010-12-26 16:46:38 UTC
arm/sparc stable
Comment 7 Brent Baude (RETIRED) gentoo-dev 2010-12-27 14:59:22 UTC
ppc64 done
Comment 8 Brent Baude (RETIRED) gentoo-dev 2011-01-07 23:41:57 UTC
ppc done; closing as last arch
Comment 9 Tim Sammut (RETIRED) gentoo-dev 2011-01-07 23:49:33 UTC
(In reply to comment #8)
> ppc done
> 

Thank you, Brent. 

However, please do not close security bugs. Our policy [1] requires that we publish security advisories in many cases, and it isn't until that has happened that we can close the bug. Feel free to ping me if you have any questions. Thanks again.

[1] http://www.gentoo.org/security/en/vulnerability-policy.xml

GLSA request filed.
Comment 10 Christian Faulhammer (RETIRED) gentoo-dev 2011-01-07 23:54:52 UTC
All vulnerable versions cleaned up, my last action as net-misc/tor maintainer, handing over to blueness and ciiph.
Comment 11 Anthony Basile gentoo-dev 2011-01-09 14:08:36 UTC
(In reply to comment #10)
> All vulnerable versions cleaned up, my last action as net-misc/tor maintainer,
> handing over to blueness and ciiph.
> 

Heh, beat me to it!  Thanks Christian.

I'm closing this one since no more vulnerable versions are on the tree.
Comment 12 Tim Sammut (RETIRED) gentoo-dev 2011-01-09 16:47:32 UTC
(In reply to comment #11)
>
> I'm closing this one since no more vulnerable versions are on the tree.
> 

Please do not close security bugs. Our policy [1] requires that we publish an advisory for some security issues. We will close the bug once that has happened. Feel free to ping me if you have any questions. Thanks.

[1] http://www.gentoo.org/security/en/vulnerability-policy.xml
Comment 13 Tim Sammut (RETIRED) gentoo-dev 2011-01-15 02:15:25 UTC
Thanks, folks. This has been published as GLSA 201101-02.
Comment 14 Tim Sammut (RETIRED) gentoo-dev 2011-10-14 23:24:42 UTC
*** Bug 386211 has been marked as a duplicate of this bug. ***