MGASA-2014-0059

Source
https://advisories.mageia.org/MGASA-2014-0059.html
Import Source
https://advisories.mageia.org/MGASA-2014-0059.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0059
Related
Published
2014-02-12T17:13:24Z
Modified
2016-09-19T09:31:55Z
Summary
Updated tor package fixes security vulnerability
Details

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for relay identity keys and hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors (CVE-2013-7295).

References
Credits

Affected packages

Mageia:4 / tor

Package

Name
tor
Purl
pkg:rpm/mageia/tor?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.4.20-1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / tor

Package

Name
tor
Purl
pkg:rpm/mageia/tor?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.4.20-1.mga3

Ecosystem specific

{
    "section": "core"
}