Bug 475454 (CVE-2008-5398)
Summary: | CVE-2008-5398 tor: does not properly process the ClientDNSRejectInternalAddresses configuration option | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | rh-bugzilla |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://blog.torproject.org/blog/tor-0.2.0.32-released | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-12-09 10:23:20 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Lieskovsky
2008-12-09 09:59:33 UTC
This issue affects all versions of the tor package, as shipped with Fedora releases of 8, 9 and 10. Please upgrade to latest upstream packages or apply the above patch. CVE description missing in the comment #0: Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream. All current Fedora versions are already updated to upstream version 0.2.0.23: https://admin.fedoraproject.org/updates/F8/FEDORA-2008-10954 https://admin.fedoraproject.org/updates/F9/FEDORA-2008-10989 https://admin.fedoraproject.org/updates/F10/FEDORA-2008-10991 |