Revisions of tor
Automatic submission by obs-autosubmit
- tor 0.3.1.9 with the following security fixes that prevent some traffic confirmation, DoS and other problems (bsc#1070849): * CVE-2017-8819: Replay-cache ineffective for v2 onion services * CVE-2017-8820: Remote DoS attack against directory authorities * CVE-2017-8821: An attacker can make Tor ask for a password * CVE-2017-8822: Relays can pick themselves in a circuit path * CVE-2017-8823: Use-after-free in onion service v2 (forwarded request 547268 from AndreasStieger)
tor 0.3.1.8
tor 0.3.7.1 CVE-2017-0380 TROVE-2017-008, boo#1059194
1
tor 0.3.0.9 CVE-2017-0377 bsc#1046845 (forwarded request 507336 from AndreasStieger)
- tor 0.3.0.8 fixing a pair of bugs that would allow an attacker to remotely crash a hidden service with an assertion failure * CVE-2017-0375: remotely triggerable assertion failure when a hidden service handles a malformed BEGIN cell (bsc#1043455) * CVE-2017-0376: remotely triggerable assertion failure caused by receiving a BEGIN_DIR cell on a hidden service rendezvous circuit (bsc#1043456)
- fix build with GCC 7: warning-errors on implicit fallthrough add tor-0.3.0.7-gcc7-fallthrough.patch bsc#1041262
0.3.0.7 bsc#1039211
tor 0.3.0.6
tor 0.2.9.10 boo#1027539 (forwarded request 461734 from AndreasStieger)
1
1
1
tor 0.2.8.10 (forwarded request 443226 from AndreasStieger)
tor 0.2.8.9 boo#1005292
1
1
1
adjust nologin shell for tor user boo#971872
Displaying revisions 61 - 80 of 122