{"id":"MGASA-2014-0256","summary":"Updated tor packages fix multiple vulnerabilities","details":"Update to version 0.2.4.22 which solves these major and security problems:\n\n\n   - Block authority signing keys that were used on authorities\n     vulnerable to the \"heartbleed\" bug in OpenSSL (CVE-2014-0160).\n\n   - Fix a memory leak that could occur if a microdescriptor parse\n     fails during the tokenizing step.\n\n   - The relay ciphersuite list is now generated automatically based on\n     uniform criteria, and includes all OpenSSL ciphersuites with\n     acceptable strength and forward secrecy.\n\n   - Relays now trust themselves to have a better view than clients of\n     which TLS ciphersuites are better than others.\n\n   - Clients now try to advertise the same list of ciphersuites as\n     Firefox 28.\n\n\nFor other changes see the upstream change log\n","modified":"2026-04-16T06:25:05.416235742Z","published":"2014-06-06T14:33:56Z","upstream":["CVE-2014-0160"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0256.html"},{"type":"WEB","url":"https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11922"}],"affected":[{"package":{"name":"tor","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/tor?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.4.22-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0256.json"}},{"package":{"name":"tor","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/tor?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.4.22-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0256.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}