Mageia 2021-0293: tor security update
Summary
Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell on half-closed
streams. Previously, clients failed to validate which hop sent these cells:
this would allow a relay on a circuit to end a stream that wasn't actually
built with it (CVE-2021-34548).
hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549).
out-of-bounds memory access in v3 onion service descriptor parsing
(CVE-2021-34550).
See also upstream release notes for included other bugfixes.
This package also fixes an error in tor package's un-install script (mga#29158).
References
- https://bugs.mageia.org/show_bug.cgi?id=29136
- https://bugs.mageia.org/show_bug.cgi?id=29158
- https://blog.torproject.org/new-stable-security-releases-03515-0449-0459-0465/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/RST7YTNTKJURIR2QVIJMEBXWW2YHETRX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34549
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34550
Resolution
MGASA-2021-0293 - Updated tor package fixes security vulnerabilities
SRPMS
- 8/core/tor-0.3.5.15-1.1.mga8
- 7/core/tor-0.3.5.15-1.1.mga7