Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 21 Aug 2012 07:59:16 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>
Subject: Re: CVE Request -- Tor 0.2.2.38: Three issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/21/2012 04:10 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> Tor upstream has recently released v0.2.2.38 version, correcting
> three security flaws:
> 
> 1) tor: Read from freed memory and double free by processing failed
> DNS request Upstream ticket: [1]
> https://trac.torproject.org/projects/tor/ticket/6480
> 
> Relevant patch: [2]
> https://gitweb.torproject.org/tor.git/commitdiff/62637fa22405278758febb1743da9af562524d4c
>
>  References: [3]
> https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html
>
> 
[4] https://bugzilla.novell.com/show_bug.cgi?id=776642
> [5] https://bugzilla.redhat.com/show_bug.cgi?id=849949

Please use CVE-2012-3517 for this issue.

> 2) tor: Unitialized memory read by reading vote or consensus
> document with unrecognized flavor name Upstream ticket: [6]
> https://trac.torproject.org/projects/tor/ticket/6530
> 
> Relevant patches: [7]
> https://gitweb.torproject.org/tor.git/commitdiff/57e35ad3d91724882c345ac709666a551a977f0f
>
> 
[8]
https://gitweb.torproject.org/tor.git/commitdiff/55f635745afacefffdaafc72cc176ca7ab817546
> 
> References: [9]
> https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html
>
> 
[10] https://bugzilla.novell.com/show_bug.cgi?id=776642
> Note: No Red Hat bug (Fedora tor versions already updated && EPEL
> one not affected).

Please use CVE-2012-3518 for this issue.

> 3) tor: Client's relays path information leak Upstream ticket: [11]
> https://trac.torproject.org/projects/tor/ticket/6537
> 
> Relevant patches: [12]
> https://gitweb.torproject.org/tor.git/commitdiff/308f6dad20675c42b29862f4269ad1fbfb00dc9a
>
> 
[13]
https://gitweb.torproject.org/tor.git/commitdiff/d48cebc5e498b0ae673635f40fc57cdddab45d5b
> 
> References: [14]
> https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html
>
> 
[15] https://bugzilla.novell.com/show_bug.cgi?id=776642
> Note: No Red Hat bug (same as in case 2,).

Please use CVE-2012-3519 for this issue.

> Could you allocate a CVE ids for these?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=j7Ff
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ