{"affected":[{"ecosystem_specific":{"binaries":[{"tor":"0.4.4.6-bp152.2.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 12","name":"tor","purl":"pkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.4.6-bp152.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.4.6-bp152.2.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP1","name":"tor","purl":"pkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.4.6-bp152.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.4.6-bp152.2.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP2","name":"tor","purl":"pkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.4.6-bp152.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.4.6-bp152.2.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"tor","purl":"pkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.4.6-bp152.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.4.6-bp152.2.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"tor","purl":"pkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.4.6-bp152.2.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tor fixes the following issues:\n\nUpdating tor to a newer version in the respective codestream.\n\n- tor 0.3.5.12:\n  * Check channels+circuits on relays more thoroughly (TROVE-2020-005, boo#1178741)\n  * Not affected by out-of-bound memory access (CVE-2020-15572, boo#1173979)\n  * Fix DoS defenses on bridges with a pluggable transport\n  * CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)\n  * CVE-2020-10593: circuit padding memory leak (boo#1167014) \n\n- tor 0.4.4.6\n  * Check channels+circuits on relays more thoroughly (TROVE-2020-005, boo#1178741)\n  * Fix a crash due to an out-of-bound memory access (CVE-2020-15572, boo#1173979)\n  * Fix logrotate to not fail when tor is stopped (boo#1164275)\n","id":"openSUSE-SU-2020:1970-1","modified":"2020-11-19T15:25:33Z","published":"2020-11-19T15:25:33Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1164275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167014"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-15572"}],"related":["CVE-2020-10592","CVE-2020-10593","CVE-2020-15572"],"summary":"Security update for tor","upstream":["CVE-2020-10592","CVE-2020-10593","CVE-2020-15572"]}