{"affected":[{"ecosystem_specific":{"binaries":[{"tor":"0.3.5.10-bp151.3.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP1","name":"tor","purl":"pkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.3.5.10-bp151.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tor to version 0.3.5.10 fixes the following issues:\n\n- tor was updated to version 0.3.5.10:\n\n- CVE-2020-10592: Fixed a CPU consumption denial of service and \n  timing patterns (boo#1167013)\n- CVE-2020-10593: Fixed a circuit padding memory leak (boo#1167014) \n\nThis update was imported from the openSUSE:Leap:15.1:Update update project.","id":"openSUSE-SU-2020:0428-1","modified":"2020-03-31T13:06:54Z","published":"2020-03-31T13:06:54Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P66MTGQU7DD4YK5V5CBW475VUBTOMUF7/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10593"}],"related":["CVE-2020-10592","CVE-2020-10593"],"summary":"Security update for tor","upstream":["CVE-2020-10592","CVE-2020-10593"]}