Mageia 2021-0180: tor security update
Summary
The dump_desc() function that we used to dump unparseable information to disk,
was called incorrectly in several places, in a way that could lead to excessive
CPU usage (CVE-2021-28089).
A bug in appending detached signatures to a pending consensus document could be
used to crash a directory authority (CVE-2021-28090).
References
- https://bugs.mageia.org/show_bug.cgi?id=28628
- https://blog.torproject.org/new-releases-with-security-fixes-tor-03514-0448-and-0457/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28090
Resolution
MGASA-2021-0180 - Updated tor packages fix security vulnerabilities
SRPMS
- 7/core/tor-0.3.5.14-1.mga7
- 8/core/tor-0.3.5.14-1.mga8