tor: CVE-2016-1254 (TROVE-2016-12-002): read past allocated buffer in hidden service descriptor parsing

Related Vulnerabilities: CVE-2016-1254  

Debian Bug report logs - #848847
tor: CVE-2016-1254 (TROVE-2016-12-002): read past allocated buffer in hidden service descriptor parsing

version graph

Package: tor; Maintainer for tor is Peter Palfrader <weasel@debian.org>; Source for tor is src:tor (PTS, buildd, popcon).

Reported by: Peter Palfrader <weasel@debian.org>

Date: Tue, 20 Dec 2016 07:03:01 UTC

Severity: serious

Tags: security

Found in version 0.2.0.8-alpha-1

Fixed in versions 0.2.4.27-3, tor/0.2.9.8-1, 0.2.5.12-4

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://trac.torproject.org/projects/tor/ticket/21018

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org:
Bug#848847; Package tor. (Tue, 20 Dec 2016 07:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to Peter Palfrader <weasel@debian.org>:
New Bug report received and forwarded. (Tue, 20 Dec 2016 07:03:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Peter Palfrader <weasel@debian.org>
To: submit@bugs.debian.org
Subject: read past allocated buffer in hidden service descriptor parsing
Date: Tue, 20 Dec 2016 06:59:49 +0000
Package: tor
Version: 0.2.0.8-alpha-1
Severity: serious

It has been discovered that Tor may read one byte past an allocated
buffer while parsing hidden service descriptors.

This may enable a malicions hidden service to crash clients attempting
to access it in some circumstances.

-- 
                            |  .''`.       ** Debian **
      Peter Palfrader       | : :' :      The  universal
 https://www.palfrader.org/ | `. `'      Operating System
                            |   `-    https://www.debian.org/



Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Tue, 20 Dec 2016 07:12:04 GMT) (full text, mbox, link).


Notification sent to Peter Palfrader <weasel@debian.org>:
Bug acknowledged by developer. (Tue, 20 Dec 2016 07:12:04 GMT) (full text, mbox, link).


Message #10 received at 848847-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: Peter Palfrader <weasel@debian.org>
Subject: tor_0.2.9.8-1_weasel.changes ACCEPTED into experimental
Date: Mon, 19 Dec 2016 21:18:35 +0000
[Message part 1 (application/pgp, inline)]
Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 19 Dec 2016 15:53:38 +0100
Source: tor
Binary: tor tor-dbg tor-geoipdb
Architecture: source
Version: 0.2.9.8-1
Distribution: experimental
Urgency: medium
Maintainer: Peter Palfrader <weasel@debian.org>
Changed-By: Peter Palfrader <weasel@debian.org>
Description:
 tor        - anonymizing overlay network for TCP
 tor-dbg    - debugging symbols for Tor
 tor-geoipdb - GeoIP database for Tor
Changes:
 tor (0.2.9.8-1) experimental; urgency=medium
 .
   * New upstream version, upload 0.2.9.x tree to unstable.
   * Add a comment to tor@.service explaining why we cannot limit to
     /var/lib/tor-instances/<instance> but only to /var/lib/tor-instances --
     systemd does not do instance expansion in ReadWriteDirectories lines --
     cf.  #781730.
   * Update README.Debian to mention a good location to put onion service
     UNIX sockets.  Note that neither systemd nor apparmor limits access
     to them -- cf. #846275.
   * Use -Z (Apply SE-Linux labels) to install when creating instance datadirs
     in tor-instance-create.
Checksums-Sha1:
 80be9657016c9760ce897fd10443590e43df45ca 1820 tor_0.2.9.8-1.dsc
 02364a45486ea70e3cdfdf2a195ae7501f0a5f26 5522235 tor_0.2.9.8.orig.tar.gz
 70daa4cc8e9ca66f2bc85bc74193845e58c5e4bb 41446 tor_0.2.9.8-1.diff.gz
Checksums-Sha256:
 2431c125054627848e6ae89bc41f66dc22ea1fe5c97a1d656ab48a7165267781 1820 tor_0.2.9.8-1.dsc
 fbdd33d3384574297b88744622382008d1e0f9ddd300d330746c464b7a7d746a 5522235 tor_0.2.9.8.orig.tar.gz
 eb6d9382cd91e9ceb967a291e63548e0e7045586b3841071deabdbc56cd8be37 41446 tor_0.2.9.8-1.diff.gz
Files:
 a3773a2fc8def681a2cdfe035da1e1b2 1820 net optional tor_0.2.9.8-1.dsc
 1fb879608c5237294cb7e682e486b073 5522235 net optional tor_0.2.9.8.orig.tar.gz
 a0b97c1ca94075449b9b1afe0a34a739 41446 net optional tor_0.2.9.8-1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJYWEkZAAoJEIYCyCA4cjMfg9sIAMStHsiyS6uveq5fs3hLPMcb
PxD8Z/wJd8ot8R4QcWlqIGh6kJb0BY7BSRYy141hQ3oMB7AcMGkNZSXtqGpNuaFU
jA6xl8DZOXyzup5Zj8qruqd8JF3Sw0vzfa4FH85JtumUUGANngWWfpk8n9hsl+c+
lxc7GWRjHCWHixuJqd2wXsdRmBCj3o1b5BTd2CFiBfM4UyuG+HMTJRqNXQoLeMIy
8NkvuxXDCiJ791+Y1lq+3GDzbhGg/N9/i5LVJOja0uW/DXUb98E/8y2X6to2fayi
3xfIwD6tGnccvsWa0KQDMZhuvaujvO7oYy+bMJ5/OMp2ylTv3j791b3u3nxVSLk=
=sjnH
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.




Marked as fixed in versions tor/0.2.9.8-1. Request was from Paul Wise <pabs@debian.org> to control@bugs.debian.org. (Tue, 20 Dec 2016 07:15:02 GMT) (full text, mbox, link).


Set Bug forwarded-to-address to 'https://trac.torproject.org/projects/tor/ticket/21018'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 20 Dec 2016 07:33:08 GMT) (full text, mbox, link).


Changed Bug title to 'tor: CVE-2016-1254 (TROVE-2016-12-002): read past allocated buffer in hidden service descriptor parsing' from 'read past allocated buffer in hidden service descriptor parsing'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 20 Dec 2016 07:33:09 GMT) (full text, mbox, link).


Message #17 received at 848847-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: <dak@security.debian.org>, <weasel@debian.org>
Subject: tor_0.2.5.12-4_weasel.changes ACCEPTED into stable->embargoed
Date: Mon, 19 Dec 2016 21:30:10 +0000
[Message part 1 (application/pgp, inline)]
Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 19 Dec 2016 22:01:22 +0100
Source: tor
Binary: tor tor-dbg tor-geoipdb
Architecture: source all
Version: 0.2.5.12-4
Distribution: jessie-security
Urgency: medium
Maintainer: Peter Palfrader <weasel@debian.org>
Changed-By: Peter Palfrader <weasel@debian.org>
Description:
 tor        - anonymizing overlay network for TCP
 tor-dbg    - debugging symbols for Tor
 tor-geoipdb - GeoIP database for Tor
Changes:
 tor (0.2.5.12-4) jessie-security; urgency=medium
 .
   * Fix for an issue (Tor#21018) where Tor clients could crash when
     attempting to visit a hostile hidden service.
     [TROVE-2016-12-002,CVE-2016-1254]
Checksums-Sha1:
 37c40667328778a4ff78378c9b0477b262e79492 1761 tor_0.2.5.12-4.dsc
 1012c41c470e108c9ad77f94240b25bd5f2f7bcd 38710 tor_0.2.5.12-4.diff.gz
 3d7c475e00b022141248e206aa9343b000fc0a4e 815082 tor-geoipdb_0.2.5.12-4_all.deb
Checksums-Sha256:
 ff1491c96380ec16c77d272b33832dbc4d586c4e8095dc25c9aadec381e9d46b 1761 tor_0.2.5.12-4.dsc
 42e62e0729c3f8c2773e58bcbf5537339da855c97d18703553de145b17d054cc 38710 tor_0.2.5.12-4.diff.gz
 3ea2648b289e86522400a6491200de334c5dd8729236be2b92ea89e46de28b66 815082 tor-geoipdb_0.2.5.12-4_all.deb
Files:
 856c619c5e36c32e1581b692f0bb14fb 1761 net optional tor_0.2.5.12-4.dsc
 a863741884d56af0eedb78eca4ebac9c 38710 net optional tor_0.2.5.12-4.diff.gz
 8d13cfcc3c2eb96656c4519cbd1d11df 815082 net extra tor-geoipdb_0.2.5.12-4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJYWE/fAAoJEIYCyCA4cjMfuyoH/1reH8m+c+NrmWRuWI4PWChz
jnR4bYv7NWNwzwdgOCaaKnqOEohTfWBF2BUebXQV3DdNZq7dtvVNq17saxiXEFHB
SjCGrSAhZO4dLsKfImyQ/cLqB08VJ2olsOmoE1ywZ4SDH7F1+JiJgB6erm6/tRHz
v7ziYlmD2h9aYNnUxYD+cA9iM3wYPn+2Y1cijedLPeM/p2NjVLKydv7Qu0cmJlvO
RnjjGTd8sSXOD5KNKMIm+ztncIdbIvB58991/s01UF05S0WF51zRrnmm2GF7FxC2
9SJS9Ryf/6NfB5vplVoAz08uSBNFFx023DojNsHy6LZBkIpk1uMrjTzQC5vE1cM=
=j2eL
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.




Marked as fixed in versions 0.2.5.12-4. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 20 Dec 2016 12:09:04 GMT) (full text, mbox, link).


Message sent on to Peter Palfrader <weasel@debian.org>:
Bug#848847. (Tue, 20 Dec 2016 12:09:07 GMT) (full text, mbox, link).


Message #22 received at 848847-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 848847-submitter@bugs.debian.org
Subject: closing 848847
Date: Tue, 20 Dec 2016 13:08:10 +0100
close 848847 0.2.5.12-4
thanks




Marked as fixed in versions 0.2.4.27-3. Request was from Peter Palfrader <weasel@debian.org> to control@bugs.debian.org. (Tue, 20 Dec 2016 12:33:06 GMT) (full text, mbox, link).


Message #25 received at 848847-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: <dak@security.debian.org>, <weasel@debian.org>
Subject: tor_0.2.4.27-3_weasel.changes ACCEPTED into oldstable
Date: Tue, 20 Dec 2016 12:30:12 +0000
[Message part 1 (application/pgp, inline)]
Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 19 Dec 2016 22:01:22 +0100
Source: tor
Binary: tor tor-dbg tor-geoipdb
Architecture: source all
Version: 0.2.4.27-3
Distribution: wheezy-security
Urgency: medium
Maintainer: Peter Palfrader <weasel@debian.org>
Changed-By: Peter Palfrader <weasel@debian.org>
Description: 
 tor        - anonymizing overlay network for TCP
 tor-dbg    - debugging symbols for Tor
 tor-geoipdb - GeoIP database for Tor
Changes: 
 tor (0.2.4.27-3) wheezy-security; urgency=medium
 .
   * Fix for an issue (Tor#21018) where Tor clients could crash when
     attempting to visit a hostile hidden service.
     [TROVE-2016-12-002,CVE-2016-1254]
Checksums-Sha1: 
 39e0a65e1acc3b3e3eb1118bee81efd7dead3674 1693 tor_0.2.4.27-3.dsc
 998bdc3c086e8ec32455061f555984f9a5e19286 38997 tor_0.2.4.27-3.diff.gz
 6045414538bf0890dafe1192b62c951733310c05 1199948 tor-geoipdb_0.2.4.27-3_all.deb
Checksums-Sha256: 
 99eee0b7ee20dfcc1b16147d0b9719dfc663eae631eef4a5b82647d1b036befe 1693 tor_0.2.4.27-3.dsc
 d4482c84003befea88d8995ced15e88d1c7d445bfe2545560627473029d9ecff 38997 tor_0.2.4.27-3.diff.gz
 fc401b0640b69f51149626fffa3be33f9fe59dd5c523803e30c18e1feef7ad41 1199948 tor-geoipdb_0.2.4.27-3_all.deb
Files: 
 84bb4490e1b1ef9043aa9a380ab2de95 1693 net optional tor_0.2.4.27-3.dsc
 d19edaa242552f1d849f29d5377f34e1 38997 net optional tor_0.2.4.27-3.diff.gz
 90ef0664f0f4355808f13ccfba5424cb 1199948 net extra tor-geoipdb_0.2.4.27-3_all.deb

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEs4PXhajJL968BgN2hgLIIDhyMx8FAlhZGrwACgkQhgLIIDhy
Mx/P6Af7BZPL/VhX1IVN/CfLXVH0LBzvXCGoZziJu+TW8HxsP9/BRIwRpbSN2zVa
zBz0iUSUHOlN5dXGyPyALAmuD4L3Bx9xUqP4Uzuzn9B30XRt6mt4vPAJPsro0dYJ
1a/WW7NbFF+X/rd/Q5AmSwXHtfvqkWB6ZaNy25fgWTmxW4w1t8fpie5ck4QRYuwq
vEIw+BCiGzCuEogoKsgqwHTS2k+Y4gAb6fLhaOT0AAmZ08kygVDvPoLAItd/lEBl
3f0/G8NocRN/7TqtE87O1tIlhR/9ilqNtS5S4I6ib9TkVGR7ryVFkUmiPUvGGP5N
1/YKtSCM4iXp1yX/E8zFLUCi0A7Eag==
=U0/E
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.




Added tag(s) security. Request was from Niels Thykier <niels@thykier.net> to control@bugs.debian.org. (Wed, 21 Dec 2016 07:33:06 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 30 Jan 2017 07:33:43 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:41:16 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.