From nobody Sat Jan 14 13:07:39 2023 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NvJVN1DqZz2p1gv; Sat, 14 Jan 2023 13:07:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NvJVN0qCSz3G02; Sat, 14 Jan 2023 13:07:40 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1673701660; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=xDkN+erjygue2K1XQi57o2t2YxNcYJA4O2mkNmtUs28=; b=EhKL0gZocmMTwfn6HpGEBGcy+hIen8Rg60Ymg+n4sq/L5yk9bogObNHDkbWReRQeCBnQPd 8JKRio1ClzToMetQriY9zySj9SLMSZqiuGPdo+vH0CgJ+R6OYIRw9I3YaSwy2SqFBysTrL cSJ/Jt+TMRF7RHzvvnY1FMo6Q8jmsN4hXRQrr3mRT+YmX30gV3j3V+nbbxWU6rlodUmbzH LQI3GhknmR9v1OieJr687oHdLVTxLUXYZEFZJ5nHB7Uuxy1JM8MoTIRP02OZdj6M88Nlf+ FAXWYvE1aNagc4noAH9xcfo+Q1Ag8VTb06h5mM3nT7ksXjxSD31zQGElPw37ZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1673701660; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=xDkN+erjygue2K1XQi57o2t2YxNcYJA4O2mkNmtUs28=; b=jYp880RusMKjPjagOf0UhzKqw2l8e+nQWECqinK5h6Ic5NO3SEMBdiaGqOOXPDZJY8WDnT OFJCMpAGDAI3/JkTyd9Qem7fJ+WOc4UFXbrsATlwqOUPxlLF0OOQkl3NeUIBDmoNEpKfVr YqtjaNb5BTWmgiR9FID8cblHCVayzVYtOccPUt2fx+0DJA3gGVh2kAAAlFcDNqVnG8tLkZ ZceG968AlLyvKw+D39BreEfRQDTVimgK01neOZGSgIPAzapZYhIv1IOSsyS3N6+M1GGCtV hv5SIKzmm4cj4w8KJ8+cdcwmY9cwCCKsbwgSUQFOTl1yY0mTeZqM9QhTt5yWEA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1673701660; a=rsa-sha256; cv=none; b=lNKirLL1xGR7gzc3iEksHb+/syaa3RYNQ4FdvJwf2Gzs2VpUCt1bJ4a6bWYX4ZnJvrETW+ 4wgpPbTAXXf1FSq4vIp9TLCh+K8EhiKSeuAWmQ2wS6D9SH2h4Cx6x6Rp82BQCKc+xUA0EW ff0FNqqltePQpwPMAOQnLXNnzPfDbuU31hXHlJIIkLeYA6t1ArANMhW39maap+ufr4yDiI eod+Ki2s8q74x9Bu1AKgCYZCgHwR73OWyOio3YNg/vXxa2gpOseS+k9SwcBaTG9lYHQzha VezAh+mXqOHA7Bek3JnMhHgN2BcuDTXZrwH4IIbRF92yklOsIPwOExU6KxZMvg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4NvJVM6stLzpRD; Sat, 14 Jan 2023 13:07:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 30ED7dSF088968; Sat, 14 Jan 2023 13:07:39 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 30ED7dve088967; Sat, 14 Jan 2023 13:07:39 GMT (envelope-from git) Date: Sat, 14 Jan 2023 13:07:39 GMT Message-Id: <202301141307.30ED7dve088967@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Rene Ladan Subject: git: 226a0bf76387 - main - security/vuxml: add security/tor < 0.4.7.13 for TROVE-2022-002 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rene X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 226a0bf7638737dd173675e82bd2639c2374e2ad Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=226a0bf7638737dd173675e82bd2639c2374e2ad commit 226a0bf7638737dd173675e82bd2639c2374e2ad Author: Rene Ladan AuthorDate: 2023-01-14 13:04:23 +0000 Commit: Rene Ladan CommitDate: 2023-01-14 13:05:20 +0000 security/vuxml: add security/tor < 0.4.7.13 for TROVE-2022-002 Obtained from: https://gitlab.torproject.org/tpo/core/tor/-/issues/40730 --- security/vuxml/vuln/2023.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 6a669be69bf9..abc06ec29864 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,33 @@ + + security/tor -- SOCKS4(a) inversion bug + + + tor + 0.4.7.13 + + + + +

The Tor Project reports:

+
+

TROVE-2022-002: The SafeSocks option for SOCKS4(a) is inverted leading to SOCKS4 going through

+

This is a report from hackerone:
+ We have classified this as medium considering that tor was not defending in-depth for dangerous SOCKS request and so any user relying on SafeSocks 1 to make sure they don't link DNS leak and their Tor traffic wasn't safe afterall for SOCKS4(a). + Tor Browser doesn't use SafeSocks 1 and SOCKS4 so at least the likely vast majority of users are not affected. +

+
+ +
+ + https://hackerone.com/bugs?subject=torproject&report_id=1784589 + https://gitlab.torproject.org/tpo/core/tor/-/issues/40730 + + + 2023-01-12 + 2023-01-14 + +
+ emacs -- arbitary shell command execution vulnerability of ctags