{"affected":[{"ecosystem_specific":{"binaries":[{"tor":"0.4.5.9-lp152.2.12.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"tor","purl":"pkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.5.9-lp152.2.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tor fixes the following issues:\n\ntor 0.4.5.9\n\n* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)\n* Detect more failure conditions from the OpenSSL RNG code (boo#1187323)\n* Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)\n* Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)\n\ntor 0.4.5.8\n\n* https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html\n* allow Linux sandbox with Glibc 2.33\n* work with autoconf 2.70+\n* several other minor features and bugfixes (see announcement)\n\n- Fix logging issue due to systemd picking up stdout - boo#1181244\n  Continue to log notices to syslog by default.\n","id":"openSUSE-SU-2021:0926-1","modified":"2021-06-25T18:34:10Z","published":"2021-06-25T18:34:10Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJI5DAQGLSGJLTAEBDK3BJ65DR3SJHCE/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179331"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187324"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-34548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-34549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-34550"}],"related":["CVE-2021-34548","CVE-2021-34549","CVE-2021-34550"],"summary":"Security update for tor","upstream":["CVE-2021-34548","CVE-2021-34549","CVE-2021-34550"]}