Bugzilla – Bug 1005292
VUL-0: CVE-2016-8860: tor: out-of-bounds read on buffer chunks (TROVE-2016-10-001)
Last modified: 2016-12-28 15:10:27 UTC
Reference: [1] https://trac.torproject.org/projects/tor/ticket/20384 [1]: ================================================================= Tor 0.2.9.4-alpha fixes a security hole in previous versions of Tor that would allow a remote attacker to crash a Tor client, hidden service, relay, or authority. All Tor users should upgrade to this version, or to 0.2.8.9. Patches will be released for older versions of Tor. Major features (security fixes): - Prevent a class of security bugs caused by treating the contents of a buffer chunk as if they were a NUL-terminated string. At least one such bug seems to be present in all currently used versions of Tor, and would allow an attacker to remotely crash most Tor instances, especially those compiled with extra compiler hardening. With this defense in place, such bugs can't crash Tor, though we should still fix them as they occur. Closes ticket 20384 (TROVE-2016-10-001). ================================================================= [2] http://download.opensuse.org/repositories/network/openSUSE_Leap_42.1/x86_64/ tor-0.2.8.8-103.1.x86_64.rpm
[2] http://seclists.org/oss-sec/2016/q4/178 ============================================= Hi, please assign a CVE ID for https://blog.torproject.org/blog/tor-0289-released-important-fixes Fix: https://github.com/torproject/tor/commit/3cea86eb2fbb65949673eb4ba8ebb695c87a57ce Bug: https://trac.torproject.org/projects/tor/ticket/20384 Cheers, Moritz =============================================
*** Bug 1005213 has been marked as a duplicate of this bug. ***
Mikhail, please rest assured that we do read oss-sec and do not miss CVEs assigned there. Also in this case the maintainer (me) was subscribed to the upstream -announce mailing list, which resulted in bug 1005213. If you could so a search first that would avoid duplicates and extra work.
(In reply to Andreas Stieger from comment #3) > Mikhail, please rest assured that we do read oss-sec and do not miss CVEs > assigned there. Also in this case the maintainer (me) was subscribed to the > upstream -announce mailing list, which resulted in bug 1005213. If you could > so a search first that would avoid duplicates and extra work. I've a habit, which sounds like "if you see bug-report, put it in bugzilla of distro you use. Only in this case you can be sure, that it won't be missed and you'll get the fix". But ok, no problem, if oss-sec mesages are under monitoring by (open-)SUSE guys.
(In reply to Mikhail Kasimov from comment #4) > (In reply to Andreas Stieger from comment #3) > > Mikhail, please rest assured that we do read oss-sec and do not miss CVEs > > assigned there. Also in this case the maintainer (me) was subscribed to the > > upstream -announce mailing list, which resulted in bug 1005213. If you could > > so a search first that would avoid duplicates and extra work. > > I've a habit, which sounds like "if you see bug-report, put it in bugzilla > of distro you use. Only in this case you can be sure, that it won't be > missed and you'll get the fix". > > But ok, no problem, if oss-sec mesages are under monitoring by (open-)SUSE > guys. messages*
We appreciate your work. If you feel we have missed something please add or extend bugs. Fixes submitted.
This is an autogenerated message for OBS integration: This bug (1005292) was mentioned in https://build.opensuse.org/request/show/436112 13.2+42.1 / tor
This is an autogenerated message for OBS integration: This bug (1005292) was mentioned in https://build.opensuse.org/request/show/436114 Factory / tor
release
openSUSE-SU-2016:2603-1: An update that contains security fixes can now be installed. Category: security (moderate) Bug References: 1005292 CVE References: Sources used: openSUSE Leap 42.1 (src): tor-0.2.7.6-13.1 openSUSE 13.2 (src): tor-0.2.7.6-26.1
This is an autogenerated message for OBS integration: This bug (1005292) was mentioned in https://build.opensuse.org/request/show/447097 42.2 / tor
openSUSE-SU-2016:3282-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 1005292,1016343 CVE References: CVE-2016-1254 Sources used: openSUSE Leap 42.2 (src): tor-0.2.8.12-3.1