MGASA-2021-0293

Source
https://advisories.mageia.org/MGASA-2021-0293.html
Import Source
https://advisories.mageia.org/MGASA-2021-0293.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0293
Related
Published
2021-06-28T21:16:35Z
Modified
2021-06-28T20:03:58Z
Summary
Updated tor package fixes security vulnerabilities
Details

Don't allow relays to spoof RELAYEND or RELAYRESOLVED cell on half-closed streams. Previously, clients failed to validate which hop sent these cells: this would allow a relay on a circuit to end a stream that wasn't actually built with it (CVE-2021-34548).

hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549).

out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550).

See also upstream release notes for included other bugfixes.

This package also fixes an error in tor package's un-install script (mga#29158).

References
Credits

Affected packages