Bug ID 1083845
Summary VUL-0: CVE-2018-0490: tor: null-pointer crash in directory authority protocol list code (TROVE-2018-001)
Classification openSUSE
Product openSUSE Distribution
Version Leap 42.3
Hardware Other
URL https://smash.suse.de/issue/201158/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee astieger@suse.com
Reporter astieger@suse.com
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

The subprotocol implementation in 0.2.9.4-alpha had a bug where an incorrectly
formatted relay descriptor could cause directory servers to crash when they
tried to vote about it. This does not affect relays or clients, since they do
not try to vote.

>From https://lists.torproject.org/pipermail/tor-announce/2018-March/000152.html

TROVE-2018-001 only affects directory authorities.  It is a bug that
an attacker can use to cause a remote directory authority to crash.
All directory authorities should upgrade to one of the versions
released today.  It does not affect relays or clients.

    - Fix a protocol-list handling bug that could be used to remotely crash
      directory authorities with a null-pointer exception. Fixes bug 25074;
      bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001 and
      CVE-2018-0490.

Fixed in 0.2.9.15, 0.3.1.10, 0.3.2.10, 0.3.3.3-alpha

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0490
https://trac.torproject.org/projects/tor/ticket/25074


You are receiving this mail because: