{"affected":[{"ecosystem_specific":{"binaries":[{"tor":"0.4.7.11-bp154.2.9.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP3","name":"tor","purl":"pkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.7.11-bp154.2.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.7.11-bp154.2.9.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP4","name":"tor","purl":"pkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.7.11-bp154.2.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.7.11-bp154.2.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"tor","purl":"pkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.7.11-bp154.2.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tor":"0.4.7.11-bp154.2.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"tor","purl":"pkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.4.7.11-bp154.2.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tor fixes the following issues:\n\ntor 0.4.7.11:\n\n  * Improve security of DNS cache by randomly clipping the TTL\n    value (boo#1205307, TROVE-2021-009)\n  * Improved defenses against network-wide DoS, multiple counters\n    and metrics added to MetricsPorts\n  * Apply circuit creation anti-DoS defenses if the outbound\n    circuit max cell queue size is reached too many times. This\n    introduces two new consensus parameters to control the queue\n    size limit and number of times allowed to go over that limit.\n  * Directory authority updates\n  * IPFire database and geoip updates\n  * Bump the maximum amount of CPU that can be used from 16 to 128.\n    The NumCPUs torrc option overrides this hardcoded maximum.\n  * onion service: set a higher circuit build timeout for opened\n    client rendezvous circuit to avoid timeouts and retry load\n  * Make the service retry a rendezvous if the circuit is being\n    repurposed for measurements\n","id":"openSUSE-SU-2022:10209-1","modified":"2022-11-20T19:01:41Z","published":"2022-11-20T19:01:41Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMI2QZMW7Z7265ZD4MJX4P6F34NIF2HZ/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205307"}],"related":[],"summary":"Security update for tor","upstream":[]}