openSUSE Security Update: Security update for tor
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0941-1
Rating:             important
References:         #1179331 #1181244 #1187322 #1187323 #1187324 
                    #1187325 
Cross-References:   CVE-2021-34548 CVE-2021-34549 CVE-2021-34550
                   
Affected Products:
                    openSUSE Backports SLE-15-SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has three
   fixes is now available.

Description:

   This update for tor fixes the following issues:

   tor 0.4.5.9

   * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell
     (CVE-2021-34548, boo#1187322)
   * Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
   * Resist a hashtable-based CPU denial-of-service attack against relays
     (CVE-2021-34549, boo#1187324)
   * Fix an out-of-bounds memory access in v3 onion service descriptor
     parsing (CVE-2021-34550, boo#1187325)

   tor 0.4.5.8

   * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
   * allow Linux sandbox with Glibc 2.33
   * work with autoconf 2.70+
   * several other minor features and bugfixes (see announcement)

   - Fix logging issue due to systemd picking up stdout - boo#1181244
     Continue to log notices to syslog by default.

   This update was imported from the openSUSE:Leap:15.2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP2:

      zypper in -t patch openSUSE-2021-941=1



Package List:

   - openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):

      tor-0.4.5.9-bp152.2.12.1


References:

   https://www.suse.com/security/cve/CVE-2021-34548.html
   https://www.suse.com/security/cve/CVE-2021-34549.html
   https://www.suse.com/security/cve/CVE-2021-34550.html
   https://bugzilla.suse.com/1179331
   https://bugzilla.suse.com/1181244
   https://bugzilla.suse.com/1187322
   https://bugzilla.suse.com/1187323
   https://bugzilla.suse.com/1187324
   https://bugzilla.suse.com/1187325