openSUSE Security Update: Security update for tor
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0941-1
Rating:             important
References:         #1179331 #1181244 #1187322 #1187323 #1187324 
                    #1187325 
Cross-References:   CVE-2021-34548 CVE-2021-34549 CVE-2021-34550
                   
Affected Products:
                    openSUSE Backports SLE-15-SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has three
   fixes is now available.

Description:

   This update for tor fixes the following issues:

   tor 0.4.5.9

   * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell
     (CVE-2021-34548, boo#1187322)
   * Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
   * Resist a hashtable-based CPU denial-of-service attack against relays
     (CVE-2021-34549, boo#1187324)
   * Fix an out-of-bounds memory access in v3 onion service descriptor
     parsing (CVE-2021-34550, boo#1187325)

   tor 0.4.5.8

   * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
   * allow Linux sandbox with Glibc 2.33
   * work with autoconf 2.70+
   * several other minor features and bugfixes (see announcement)

   - Fix logging issue due to systemd picking up stdout - boo#1181244
     Continue to log notices to syslog by default.

   This update was imported from the openSUSE:Leap:15.2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP2:

      zypper in -t patch openSUSE-2021-941=1



Package List:

   - openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):

      tor-0.4.5.9-bp152.2.12.1


References:

   https://www.suse.com/security/cve/CVE-2021-34548.html
   https://www.suse.com/security/cve/CVE-2021-34549.html
   https://www.suse.com/security/cve/CVE-2021-34550.html
   https://bugzilla.suse.com/1179331
   https://bugzilla.suse.com/1181244
   https://bugzilla.suse.com/1187322
   https://bugzilla.suse.com/1187323
   https://bugzilla.suse.com/1187324
   https://bugzilla.suse.com/1187325

openSUSE: 2021:0941-1 important: tor

June 30, 2021
An update that solves three vulnerabilities and has three fixes is now available

Description

This update for tor fixes the following issues: tor 0.4.5.9 * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322) * Detect more failure conditions from the OpenSSL RNG code (boo#1187323) * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324) * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325) tor 0.4.5.8 * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html * allow Linux sandbox with Glibc 2.33 * work with autoconf 2.70+ * several other minor features and bugfixes (see announcement) - Fix logging issue due to systemd picking up stdout - boo#1181244 Continue to log notices to syslog by default. This update was imported from the openSUSE:Leap:15.2:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2021-941=1


Package List

- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64): tor-0.4.5.9-bp152.2.12.1


References

https://www.suse.com/security/cve/CVE-2021-34548.html https://www.suse.com/security/cve/CVE-2021-34549.html https://www.suse.com/security/cve/CVE-2021-34550.html https://bugzilla.suse.com/1179331 https://bugzilla.suse.com/1181244 https://bugzilla.suse.com/1187322 https://bugzilla.suse.com/1187323 https://bugzilla.suse.com/1187324 https://bugzilla.suse.com/1187325


Severity
Announcement ID: openSUSE-SU-2021:0941-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP2 ble.

Related News