openSUSE: 2021:0941-1 important: tor
Description
This update for tor fixes the following issues: tor 0.4.5.9 * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322) * Detect more failure conditions from the OpenSSL RNG code (boo#1187323) * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324) * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325) tor 0.4.5.8 * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html * allow Linux sandbox with Glibc 2.33 * work with autoconf 2.70+ * several other minor features and bugfixes (see announcement) - Fix logging issue due to systemd picking up stdout - boo#1181244 Continue to log notices to syslog by default. This update was imported from the openSUSE:Leap:15.2:Update update project.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2021-941=1
Package List
- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64): tor-0.4.5.9-bp152.2.12.1
References
https://www.suse.com/security/cve/CVE-2021-34548.html https://www.suse.com/security/cve/CVE-2021-34549.html https://www.suse.com/security/cve/CVE-2021-34550.html https://bugzilla.suse.com/1179331 https://bugzilla.suse.com/1181244 https://bugzilla.suse.com/1187322 https://bugzilla.suse.com/1187323 https://bugzilla.suse.com/1187324 https://bugzilla.suse.com/1187325