Oval Definition:oval:org.opensuse.security:def:20137295
Revision Date:2022-06-30Version:1
Title:CVE-2013-7295
Description:

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2013-7295
Mitre CVE-2013-7295
SUSE CVE-2013-7295
openSUSE-SU-2014:0143-1
Platform(s):openSUSE 12.3 Update
openSUSE 13.1
openSUSE Tumbleweed
Product(s):
Definition Synopsis
  • openSUSE 13.1 is installed
  • AND tor-0.2.3.25-5.4.1 is installed
  • Definition Synopsis
  • openSUSE Tumbleweed is installed
  • AND tor-0.2.8.11-1.1 is installed
  • BACK