Updated tor package fixes security vulnerabilities
Publication date: 28 Jun 2021Modification date: 28 Jun 2021
Type: security
Affected Mageia releases : 7 , 8
CVE: CVE-2021-34548 , CVE-2021-34549 , CVE-2021-34550
Description
Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell on half-closed streams. Previously, clients failed to validate which hop sent these cells: this would allow a relay on a circuit to end a stream that wasn't actually built with it (CVE-2021-34548). hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549). out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550). See also upstream release notes for included other bugfixes. This package also fixes an error in tor package's un-install script (mga#29158).
References
- https://bugs.mageia.org/show_bug.cgi?id=29136
- https://bugs.mageia.org/show_bug.cgi?id=29158
- https://blog.torproject.org/node/2041
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/RST7YTNTKJURIR2QVIJMEBXWW2YHETRX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34549
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34550
SRPMS
8/core
- tor-0.3.5.15-1.1.mga8
7/core
- tor-0.3.5.15-1.1.mga7