|
Message-ID: <5511071A.4010105@redhat.com>
Date: Tue, 24 Mar 2015 00:41:30 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: cve-assign@...re.org, weasel@...ian.org
Subject: Re: CVE request: Two vulnerabilities in Tor
With apologies, I thought they had been unlocked in BZ, did so now (they
are public now).
On 03/24/2015 12:15 AM, Salvatore Bonaccorso wrote:
> Hi all,
>
> On Mon, Mar 23, 2015 at 07:13:27PM +0100, Moritz Muehlenhoff wrote:
>> Hi,
>> please assign two CVE IDs for tor:
>>
>> The upstream announcement is here:
>> https://lists.torproject.org/pipermail/tor-talk/2015-March/037281.html
>>
>> 1.
>> | Fix a remote denial-of-service opportunity caused by a bug in
>> | OSX's _strlcat_chk() function. Fixes bug 15205; bug first
>> | appeared in OSX 10.9.
>>
>> https://trac.torproject.org/projects/tor/ticket/15205
>>
>> 2.
>> | A relay could crash with an assertion error if a buffer of
>> | exactly the wrong layout was passed to buf_pullup() at exactly the
>> | wrong time.
>>
>> https://trac.torproject.org/projects/tor/ticket/15083
>>
>> The second issue has been addressed in DSA 3203:
>> https://lists.debian.org/debian-security-announce/2015/msg00088.html
>> (the first obviously not, since it's MacOS-specific)
>
> There is anothr one which was fixed in the same versions, and could
> potentially get a CVE:
>
> https://trac.torproject.org/projects/tor/ticket/14129
>
> Regards,
> Salvatore
>
--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.