You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa tor

Sigurnosni nedostaci programskog paketa tor

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for tor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1970-1
Rating: important
References: #1164275 #1167013 #1167014 #1173979 #1178741

Cross-References: CVE-2020-10592 CVE-2020-10593 CVE-2020-15572

Affected Products:
openSUSE Leap 15.2
openSUSE Leap 15.1
openSUSE Backports SLE-15-SP2
openSUSE Backports SLE-15-SP1
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for tor fixes the following issues:

Updating tor to a newer version in the respective codestream.

– tor 0.3.5.12:
* Check channels+circuits on relays more thoroughly (TROVE-2020-005,
boo#1178741)
* Not affected by out-of-bound memory access (CVE-2020-15572,
boo#1173979)
* Fix DoS defenses on bridges with a pluggable transport
* CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
* CVE-2020-10593: circuit padding memory leak (boo#1167014)

– tor 0.4.4.6
* Check channels+circuits on relays more thoroughly (TROVE-2020-005,
boo#1178741)
* Fix a crash due to an out-of-bound memory access (CVE-2020-15572,
boo#1173979)
* Fix logrotate to not fail when tor is stopped (boo#1164275)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-1970=1

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1970=1

– openSUSE Backports SLE-15-SP2:

zypper in -t patch openSUSE-2020-1970=1

– openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2020-1970=1

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2020-1970=1

Package List:

– openSUSE Leap 15.2 (x86_64):

tor-0.4.4.6-lp152.2.3.1
tor-debuginfo-0.4.4.6-lp152.2.3.1
tor-debugsource-0.4.4.6-lp152.2.3.1

– openSUSE Leap 15.1 (x86_64):

tor-0.3.5.12-lp151.2.6.1
tor-debuginfo-0.3.5.12-lp151.2.6.1
tor-debugsource-0.3.5.12-lp151.2.6.1

– openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):

tor-0.4.4.6-bp152.2.3.1
tor-debuginfo-0.4.4.6-bp152.2.3.1
tor-debugsource-0.4.4.6-bp152.2.3.1

– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

tor-0.3.5.12-bp151.3.6.1

– SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

tor-0.3.5.12-25.1

References:

https://www.suse.com/security/cve/CVE-2020-10592.html
https://www.suse.com/security/cve/CVE-2020-10593.html
https://www.suse.com/security/cve/CVE-2020-15572.html
https://bugzilla.suse.com/1164275
https://bugzilla.suse.com/1167013
https://bugzilla.suse.com/1167014
https://bugzilla.suse.com/1173979
https://bugzilla.suse.com/1178741
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

openSUSE Security Update: Security update for tor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1970-1
Rating: important
References: #1164275 #1167013 #1167014 #1173979 #1178741

Cross-References: CVE-2020-10592 CVE-2020-10593 CVE-2020-15572

Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for tor fixes the following issues:

Updating tor to a newer version in the respective codestream.

– tor 0.3.5.12:
* Check channels+circuits on relays more thoroughly (TROVE-2020-005,
boo#1178741)
* Not affected by out-of-bound memory access (CVE-2020-15572,
boo#1173979)
* Fix DoS defenses on bridges with a pluggable transport
* CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
* CVE-2020-10593: circuit padding memory leak (boo#1167014)

– tor 0.4.4.6
* Check channels+circuits on relays more thoroughly (TROVE-2020-005,
boo#1178741)
* Fix a crash due to an out-of-bound memory access (CVE-2020-15572,
boo#1173979)
* Fix logrotate to not fail when tor is stopped (boo#1164275)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2020-1970=1

Package List:

– SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

tor-0.3.5.12-25.1

References:

https://www.suse.com/security/cve/CVE-2020-10592.html
https://www.suse.com/security/cve/CVE-2020-10593.html
https://www.suse.com/security/cve/CVE-2020-15572.html
https://bugzilla.suse.com/1164275
https://bugzilla.suse.com/1167013
https://bugzilla.suse.com/1167014
https://bugzilla.suse.com/1173979
https://bugzilla.suse.com/1178741
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

AutorDona Seruga
Cert idNCERT-REF-2020-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke c-ares

Otkriven je sigurnosni nedostatak programske biblioteke c-ares za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja. Savjetuje...

Close