Overview

Request 786984 accepted

- tor 0.4.2.7
* CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
* CVE-2020-10593: circuit padding memory leak (boo#1167014)
* Directory authorities now signal bandwidth pressure to clients
* Avoid excess logging on bug when flushing a buffer to a TLS connection

Loading...

Origin Manager's avatar

Previous comment no longer relevant.

Request History
Andreas Stieger's avatar

AndreasStieger created request

- tor 0.4.2.7
* CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
* CVE-2020-10593: circuit padding memory leak (boo#1167014)
* Directory authorities now signal bandwidth pressure to clients
* Avoid excess logging on bug when flushing a buffer to a TLS connection


Saul Goodman's avatar

licensedigger accepted review

ok


Factory Auto's avatar

factory-auto accepted review

Check script succeeded


Staging Bot's avatar

staging-bot added as a reviewer

Being evaluated by staging project "openSUSE:Leap:15.2:Staging:adi:125"


Staging Bot's avatar

staging-bot accepted review

Picked "openSUSE:Leap:15.2:Staging:adi:125"


Tomáš Chvátal's avatar

scarabeus_iv accepted review


Origin Manager's avatar

origin-manager accepted review

origin: openSUSE:Factory


Yuchen Lin's avatar

maxlin_factory accepted review

Staging Project openSUSE:Leap:15.2:Staging:adi:125 got accepted.


Yuchen Lin's avatar

maxlin_factory approved review

Staging Project openSUSE:Leap:15.2:Staging:adi:125 got accepted.


Yuchen Lin's avatar

maxlin_factory accepted request

Staging Project openSUSE:Leap:15.2:Staging:adi:125 got accepted.

openSUSE Build Service is sponsored by