Overview
Request 547269 accepted
- tor 0.3.1.9 with the following security fixes that prevent some
traffic confirmation, DoS and other problems (bsc#1070849):
* CVE-2017-8819: Replay-cache ineffective for v2 onion services
* CVE-2017-8820: Remote DoS attack against directory authorities
* CVE-2017-8821: An attacker can make Tor ask for a password
* CVE-2017-8822: Relays can pick themselves in a circuit path
* CVE-2017-8823: Use-after-free in onion service v2 (forwarded request 547268 from AndreasStieger)
- Created by AndreasStieger
- In state accepted
Request History
AndreasStieger created request
- tor 0.3.1.9 with the following security fixes that prevent some
traffic confirmation, DoS and other problems (bsc#1070849):
* CVE-2017-8819: Replay-cache ineffective for v2 onion services
* CVE-2017-8820: Remote DoS attack against directory authorities
* CVE-2017-8821: An attacker can make Tor ask for a password
* CVE-2017-8822: Relays can pick themselves in a circuit path
* CVE-2017-8823: Use-after-free in onion service v2 (forwarded request 547268 from AndreasStieger)
factory-auto added opensuse-review-team as a reviewer
Please review sources
factory-auto added repo-checker as a reviewer
Please review build success
factory-auto accepted review
Check script succeeded
staging-bot added as a reviewer
Being evaluated by staging project "openSUSE:Factory:Staging:adi:34"
staging-bot accepted review
Picked openSUSE:Factory:Staging:adi:34
repo-checker accepted review
cycle and install check passed
dimstar accepted review
licensedigger accepted review
ok
staging-bot accepted review
ready to accept
staging-bot approved review
ready to accept
dimstar_suse accepted request
Accept to openSUSE:Factory