Overview
Request 786984 accepted
- tor 0.4.2.7
* CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
* CVE-2020-10593: circuit padding memory leak (boo#1167014)
* Directory authorities now signal bandwidth pressure to clients
* Avoid excess logging on bug when flushing a buffer to a TLS connection
- Created by AndreasStieger
- In state accepted
Request History
AndreasStieger created request
- tor 0.4.2.7
* CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
* CVE-2020-10593: circuit padding memory leak (boo#1167014)
* Directory authorities now signal bandwidth pressure to clients
* Avoid excess logging on bug when flushing a buffer to a TLS connection
licensedigger accepted review
ok
factory-auto accepted review
Check script succeeded
staging-bot added as a reviewer
Being evaluated by staging project "openSUSE:Leap:15.2:Staging:adi:125"
staging-bot accepted review
Picked "openSUSE:Leap:15.2:Staging:adi:125"
scarabeus_iv accepted review
origin-manager accepted review
origin: openSUSE:Factory
maxlin_factory accepted review
Staging Project openSUSE:Leap:15.2:Staging:adi:125 got accepted.
maxlin_factory approved review
Staging Project openSUSE:Leap:15.2:Staging:adi:125 got accepted.
maxlin_factory accepted request
Staging Project openSUSE:Leap:15.2:Staging:adi:125 got accepted.
Previous comment no longer relevant.