Security update for tor

This update for tor fixes the following issues:

tor 0.4.5.9

* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)
* Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
* Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)
* Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)

tor 0.4.5.8

* https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
* allow Linux sandbox with Glibc 2.33
* several other minor features and bugfixes (see announcement)

- Fix logging issue due to systemd picking up stdout - boo#1181244
Continue to log notices to syslog by default.

Fixed bugs
bnc#1187325
VUL-0: CVE-2021-34550: tor: out-of-bounds memory access in v3 onion service descriptor parsing
bnc#1187322
VUL-0: CVE-2021-34548: tor: RELAY_END or RELAY_RESOLVED spoofing
bnc#1187324
VUL-0: CVE-2021-34549: tor: hashtable-based CPU denial-of-service attack against relays
bnc#1187323
VUL-1: tor: errors from RNG not detected
bnc#1179331
[warn] Tor was compiled with zstd 1.4.4, but is running with zstd 1.4.5 (Factory i586 tests issue)
bnc#1181244
Duplicate journal timestamp prefix for tor
Selected Binaries
openSUSE Build Service is sponsored by