Revisions of tor
buildservice-autocommit
accepted
request 567207
from
Factory Maintainer (factory-maintainer)
(revision 136)
baserev update by copy to link target
buildservice-autocommit
accepted
request 547269
from
Andreas Stieger (AndreasStieger)
(revision 134)
baserev update by copy to link target
- tor 0.3.1.9 with the following security fixes that prevent some traffic confirmation, DoS and other problems (bsc#1070849): * CVE-2017-8819: Replay-cache ineffective for v2 onion services * CVE-2017-8820: Remote DoS attack against directory authorities * CVE-2017-8821: An attacker can make Tor ask for a password * CVE-2017-8822: Relays can pick themselves in a circuit path * CVE-2017-8823: Use-after-free in onion service v2
buildservice-autocommit
accepted
request 536570
from
Andreas Stieger (AndreasStieger)
(revision 132)
baserev update by copy to link target
tor 0.3.7.2
buildservice-autocommit
accepted
request 527563
from
Andreas Stieger (AndreasStieger)
(revision 129)
baserev update by copy to link target
fix 32 bit
tor 0.3.7.1
tor 0.3.0.11 CVE-2017-0380 boo#1059194
buildservice-autocommit
accepted
request 514239
from
Andreas Stieger (AndreasStieger)
(revision 123)
baserev update by copy to link target
- tor 0.3.0.10 * Fix a typo that had prevented TPROXY-based transparent proxying from working under Linux. * Avoid an assertion failure bug affecting our implementation of inet_pton(AF_INET6) on certain OpenBSD systems.
buildservice-autocommit
accepted
request 507338
from
Andreas Stieger (AndreasStieger)
(revision 121)
baserev update by copy to link target
tor 0.3.0.9 CVE-2017-0377 bsc#1046845
buildservice-autocommit
accepted
request 502413
from
Andreas Stieger (AndreasStieger)
(revision 119)
baserev update by copy to link target
- tor 0.3.0.8 fixing a pair of bugs that would allow an attacker to remotely crash a hidden service with an assertion failure * CVE-2017-0375: remotely triggerable assertion failure when a hidden service handles a malformed BEGIN cell (bsc#1043455) * CVE-2017-0376: remotely triggerable assertion failure caused by receiving a BEGIN_DIR cell on a hidden service rendezvous circuit (bsc#1043456 - further bug fixes: * link handshake fixes when changing x509 certificates * Regenerate link and authentication certificates whenever the key that signs them changes; also, regenerate link certificates whenever the signed key changes * When sending an Ed25519 signing->link certificate in a CERTS cell, send the certificate that matches the x509 certificate that was used on the TLS connection * Stop rejecting v3 hidden service descriptors because their size did not match an old padding rule
Displaying revisions 141 - 160 of 276