| Revision Date: | 2020-11-19 | Version: | 1 |
| Title: | Security update for tor (Important) |
| Description: |
This update for tor fixes the following issues:
Updating tor to a newer version in the respective codestream.
- tor 0.3.5.12: * Check channels+circuits on relays more thoroughly (TROVE-2020-005, boo#1178741) * Not affected by out-of-bound memory access (CVE-2020-15572, boo#1173979) * Fix DoS defenses on bridges with a pluggable transport * CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013) * CVE-2020-10593: circuit padding memory leak (boo#1167014)
* - tor 0.4.4.6 * Check channels+circuits on relays more thoroughly (TROVE-2020-005, boo#1178741) * Fix a crash due to an out-of-bound memory access (CVE-2020-15572, boo#1173979) * Fix logrotate to not fail when tor is stopped (boo#1164275)
|
| Family: | unix | Class: | patch |
| Status: | | Reference(s): | 1164275 1167013 1167014 1173979 1178741 CVE-2020-10592 CVE-2020-10593 CVE-2020-15572 openSUSE-SU-2020:1970-1
|
| Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP1 SUSE Linux Enterprise Server 15 SP1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 SUSE Linux Enterprise Storage 6 SUSE Manager Proxy 4.0 SUSE Manager Server 4.0 SUSE Package Hub for SUSE Linux Enterprise 15 SP1
| Product(s): | |
| Definition Synopsis |
| SUSE Package Hub for SUSE Linux Enterprise 15 SP1 is installed AND tor-0.4.4.6-bp152.2.3.1 is installed
|