oss-sec mailing list archives
Re: CVE Request -- Tor 0.2.2.38: Three issues
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 21 Aug 2012 07:59:16 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/21/2012 04:10 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, vendors, Tor upstream has recently released v0.2.2.38 version, correcting three security flaws: 1) tor: Read from freed memory and double free by processing failed DNS request Upstream ticket: [1] https://trac.torproject.org/projects/tor/ticket/6480 Relevant patch: [2] https://gitweb.torproject.org/tor.git/commitdiff/62637fa22405278758febb1743da9af562524d4c References: [3] https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html
[4] https://bugzilla.novell.com/show_bug.cgi?id=776642
[5] https://bugzilla.redhat.com/show_bug.cgi?id=849949
Please use CVE-2012-3517 for this issue.
2) tor: Unitialized memory read by reading vote or consensus document with unrecognized flavor name Upstream ticket: [6] https://trac.torproject.org/projects/tor/ticket/6530 Relevant patches: [7] https://gitweb.torproject.org/tor.git/commitdiff/57e35ad3d91724882c345ac709666a551a977f0f
[8] https://gitweb.torproject.org/tor.git/commitdiff/55f635745afacefffdaafc72cc176ca7ab817546
References: [9] https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html
[10] https://bugzilla.novell.com/show_bug.cgi?id=776642
Note: No Red Hat bug (Fedora tor versions already updated && EPEL one not affected).
Please use CVE-2012-3518 for this issue.
3) tor: Client's relays path information leak Upstream ticket: [11] https://trac.torproject.org/projects/tor/ticket/6537 Relevant patches: [12] https://gitweb.torproject.org/tor.git/commitdiff/308f6dad20675c42b29862f4269ad1fbfb00dc9a
[13] https://gitweb.torproject.org/tor.git/commitdiff/d48cebc5e498b0ae673635f40fc57cdddab45d5b
References: [14] https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html
[15] https://bugzilla.novell.com/show_bug.cgi?id=776642
Note: No Red Hat bug (same as in case 2,).
Please use CVE-2012-3519 for this issue.
Could you allocate a CVE ids for these? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
- -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJQM5Q0AAoJEBYNRVNeJnmTloIQANccXHhHc8/RrckiTuW3DcuL DwxwVZSDkKuFAP0/o5Msg+IzMjAIWX6ErH8t/kA0XB7blzoheFwA5cqcwJCn55/B k6ZLdgSF8/gHfBkB4PmuxJ5S+00LB7Inr3FTfEoQ1yMKIy6YBC8tyYQ9ehwWlTmq pC3yJQNn3JvcN648ghasmLM0Mp2q2wtRjn1wU0eOPLWHwan4gb0BYQfDEnU32eXv iHInP6Z7v72kcOBTAq7Cq7B/Pa0E4GGlCdWwBKcG4RsP352qvAnd0mQ9zKxnCXkW z4kiSQQhAVFldsfsWqyj07HW4oH+c+gSFH5rcnO7r+IzH+EmSq+hqnYfrpTPtswV mjsCIzQtNEGn/lSSB9SWX8X9lu/WWbxyYH2iSSANPFsqlu/BK05MKIQ/u1IDoS3g lJxpyfEl21mZPS+DwlPL6wPQOlI4sDQZKrBKwRh/3AHoQ/jaSogOH1FYK+jplwbU xBX7mzSvk9Ql1sOXGXGiK43uVI3mSKfe+8c5w7mcEzMFKTKIPMncNmZyMzdY066O RgDEcZHVx/nTLCq+h2XiZTwnkvqjAMX2VCOrewxJG/TgWf+/P+8LU0F65YezB/K4 PmYONiqJyGBv17vxY9AMuTTc/rS8GbclajkxBP4hc28P+rkM8FjbysV5DfndH8y4 lLOxgCstJclruuWzhHAH =j7Ff -----END PGP SIGNATURE-----
Current thread:
- CVE Request -- Tor 0.2.2.38: Three issues Jan Lieskovsky (Aug 21)
- Re: CVE Request -- Tor 0.2.2.38: Three issues Kurt Seifried (Aug 21)