openSUSE: 2022:10023-1 important: tor | LinuxSecurity.com

Advisories


   openSUSE Security Update: Security update for tor
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2022:10023-1
Rating:             important
References:         #1200672 
Cross-References:   CVE-2022-33903
Affected Products:
                    openSUSE Backports SLE-15-SP3
                    openSUSE Backports SLE-15-SP4
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for tor fixes the following issues:

   tor was updated to 0.4.7.8:

   * Fix a scenario where RTT estimation can become wedged, seriously
     degrading congestion control performance on all circuits. This impacts
     clients, onion services, and relays, and can be triggered remotely by a
     malicious endpoint. (TROVE-2022-001, CVE-2022-33903, boo#1200672)
   * Regenerate fallback directories generated on June 17, 2022.
   * Update the geoip files to match the IPFire Location Database, as
     retrieved on 2022/06/17.
   * Allow the rseq system call in the sandbox
   * logging bug fixes


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP4:

      zypper in -t patch openSUSE-2022-10023=1

   - openSUSE Backports SLE-15-SP3:

      zypper in -t patch openSUSE-2022-10023=1



Package List:

   - openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64):

      tor-0.4.7.8-bp154.2.3.1
      tor-debuginfo-0.4.7.8-bp154.2.3.1
      tor-debugsource-0.4.7.8-bp154.2.3.1

   - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le x86_64):

      tor-0.4.7.8-bp153.2.15.1


References:

   https://www.suse.com/security/cve/CVE-2022-33903.html
   https://bugzilla.suse.com/1200672

openSUSE: 2022:10023-1 important: tor

June 22, 2022
An update that fixes one vulnerability is now available

Description

This update for tor fixes the following issues: tor was updated to 0.4.7.8: * Fix a scenario where RTT estimation can become wedged, seriously degrading congestion control performance on all circuits. This impacts clients, onion services, and relays, and can be triggered remotely by a malicious endpoint. (TROVE-2022-001, CVE-2022-33903, boo#1200672) * Regenerate fallback directories generated on June 17, 2022. * Update the geoip files to match the IPFire Location Database, as retrieved on 2022/06/17. * Allow the rseq system call in the sandbox * logging bug fixes

Patch

To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP4: zypper in -t patch openSUSE-2022-10023=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2022-10023=1

Package List

- openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64): tor-0.4.7.8-bp154.2.3.1 tor-debuginfo-0.4.7.8-bp154.2.3.1 tor-debugsource-0.4.7.8-bp154.2.3.1 - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le x86_64): tor-0.4.7.8-bp153.2.15.1

References

https://www.suse.com/security/cve/CVE-2022-33903.html https://bugzilla.suse.com/1200672

Severity
Announcement ID: openSUSE-SU-2022:10023-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP3 openSUSE Backports SLE-15-SP4 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.