File _patchinfo of Package patchinfo.16514
<patchinfo incident="16514">
<issue tracker="cve" id="2021-34549"/>
<issue tracker="cve" id="2021-34548"/>
<issue tracker="cve" id="2021-34550"/>
<issue tracker="bnc" id="1187325">VUL-0: CVE-2021-34550: tor: out-of-bounds memory access in v3 onion service descriptor parsing</issue>
<issue tracker="bnc" id="1187322">VUL-0: CVE-2021-34548: tor: RELAY_END or RELAY_RESOLVED spoofing</issue>
<issue tracker="bnc" id="1187324">VUL-0: CVE-2021-34549: tor: hashtable-based CPU denial-of-service attack against relays</issue>
<issue tracker="bnc" id="1187323">VUL-1: tor: errors from RNG not detected</issue>
<issue tracker="bnc" id="1179331">[warn] Tor was compiled with zstd 1.4.4, but is running with zstd 1.4.5 (Factory i586 tests issue)</issue>
<issue tracker="bnc" id="1181244">Duplicate journal timestamp prefix for tor</issue>
<packager>bmwiedemann</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for tor</summary>
<description>This update for tor fixes the following issues:
tor 0.4.5.9
* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)
* Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
* Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)
* Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)
tor 0.4.5.8
* https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
* allow Linux sandbox with Glibc 2.33
* several other minor features and bugfixes (see announcement)
- Fix logging issue due to systemd picking up stdout - boo#1181244
Continue to log notices to syslog by default.
</description>
</patchinfo>