Updated tor packages fix multiple vulnerabilities
Publication date: 06 Jun 2014Modification date: 22 Jan 2022
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-0160
Description
Update to version 0.2.4.22 which solves these major and security problems: - Block authority signing keys that were used on authorities vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). - Fix a memory leak that could occur if a microdescriptor parse fails during the tokenizing step. - The relay ciphersuite list is now generated automatically based on uniform criteria, and includes all OpenSSL ciphersuites with acceptable strength and forward secrecy. - Relays now trust themselves to have a better view than clients of which TLS ciphersuites are better than others. - Clients now try to advertise the same list of ciphersuites as Firefox 28. For other changes see the upstream change log
References
SRPMS
3/core
- tor-0.2.4.22-1.mga3
4/core
- tor-0.2.4.22-1.mga4