Mailinglist Archive: opensuse-updates (119 mails)

< Previous Next >
openSUSE-SU-2017:3201-1: moderate: Security update for tor
openSUSE Security Update: Security update for tor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:3201-1
Rating: moderate
References: #1070849
Cross-References: CVE-2017-8819 CVE-2017-8820 CVE-2017-8821
CVE-2017-8822 CVE-2017-8823
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for tor fixes vulnerabilities that allowed some traffic
confirmation, DoS and other attacks (bsc#1070849):

- CVE-2017-8819: Replay-cache ineffective for v2 onion services
- CVE-2017-8820: Remote DoS attack against directory authorities
- CVE-2017-8821: An attacker can make Tor ask for a password
- CVE-2017-8822: Relays can pick themselves in a circuit path
- CVE-2017-8823: Use-after-free in onion service v2


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2017-1336=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x
x86_64):

tor-0.3.1.9-8.1
tor-debuginfo-0.3.1.9-8.1
tor-debugsource-0.3.1.9-8.1


References:

https://www.suse.com/security/cve/CVE-2017-8819.html
https://www.suse.com/security/cve/CVE-2017-8820.html
https://www.suse.com/security/cve/CVE-2017-8821.html
https://www.suse.com/security/cve/CVE-2017-8822.html
https://www.suse.com/security/cve/CVE-2017-8823.html
https://bugzilla.suse.com/1070849


< Previous Next >
This Thread
  • No further messages