Revision Date: | 2021-06-29 | Version: | 1 |
Title: | Security update for tor (Important) |
Description: |
This update for tor fixes the following issues:
tor 0.4.5.9
* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322) * Detect more failure conditions from the OpenSSL RNG code (boo#1187323) * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324) * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)
tor 0.4.5.8
https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html * allow Linux sandbox with Glibc 2.33 * work with autoconf 2.70+ * several other minor features and bugfixes (see announcement)
- Fix logging issue due to systemd picking up stdout - boo#1181244 Continue to log notices to syslog by default.
This update was imported from the openSUSE:Leap:15.2:Update update project.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1179331 1181244 1187322 1187323 1187324 1187325 CVE-2021-34548 CVE-2021-34549 CVE-2021-34550 openSUSE-SU-2021:0941-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2 SUSE Linux Enterprise Storage 7 SUSE Manager Proxy 4.1 SUSE Manager Server 4.1 SUSE Package Hub for SUSE Linux Enterprise 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Package Hub for SUSE Linux Enterprise 15 SP2 is installed AND tor-0.4.5.9-bp152.2.12.1 is installed
|