File _patchinfo of Package patchinfo.16514

<patchinfo incident="16514">
  <issue tracker="cve" id="2021-34549"/>
  <issue tracker="cve" id="2021-34548"/>
  <issue tracker="cve" id="2021-34550"/>
  <issue tracker="bnc" id="1187325">VUL-0: CVE-2021-34550: tor: out-of-bounds memory access in v3 onion service descriptor parsing</issue>
  <issue tracker="bnc" id="1187322">VUL-0: CVE-2021-34548: tor: RELAY_END or RELAY_RESOLVED spoofing</issue>
  <issue tracker="bnc" id="1187324">VUL-0: CVE-2021-34549: tor: hashtable-based CPU denial-of-service attack against relays</issue>
  <issue tracker="bnc" id="1187323">VUL-1: tor: errors from RNG not detected</issue>
  <issue tracker="bnc" id="1179331">[warn] Tor was compiled with zstd 1.4.4, but is running with zstd 1.4.5 (Factory i586 tests issue)</issue>
  <issue tracker="bnc" id="1181244">Duplicate journal timestamp prefix for tor</issue>
  <packager>bmwiedemann</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for tor</summary>
  <description>This update for tor fixes the following issues:

tor 0.4.5.9

* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)
* Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
* Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)
* Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)

tor 0.4.5.8

* https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
* allow Linux sandbox with Glibc 2.33
* several other minor features and bugfixes (see announcement)

- Fix logging issue due to systemd picking up stdout - boo#1181244
  Continue to log notices to syslog by default.
</description>
</patchinfo>
openSUSE Build Service is sponsored by