MGASA-2021-0293 - Updated tor package fixes security vulnerabilities

Publication date: 28 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0293.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2021-34548,
     CVE-2021-34549,
     CVE-2021-34550

Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell on half-closed
streams. Previously, clients failed to validate which hop sent these cells:
this would allow a relay on a circuit to end a stream that wasn't actually
built with it (CVE-2021-34548).

hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549). 

out-of-bounds memory access in v3 onion service descriptor parsing
(CVE-2021-34550).

See also upstream release notes for included other bugfixes.

This package also fixes an error in tor package's un-install script (mga#29158).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29136
- https://bugs.mageia.org/show_bug.cgi?id=29158
- https://blog.torproject.org/node/2041
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/RST7YTNTKJURIR2QVIJMEBXWW2YHETRX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34549
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34550

SRPMS:
- 8/core/tor-0.3.5.15-1.1.mga8
- 7/core/tor-0.3.5.15-1.1.mga7