ALT-BU-2019-3645-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-01963
Уязвимость браузера Tor, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01891
Уязвимость функции dirvote_add_signatures_to_pending_consensus() браузера Tor, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01909
Уязвимость функции dump_desc() браузера Tor, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10592
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
Modified: 2024-11-21
CVE-2020-10593
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
Modified: 2024-11-21
CVE-2020-15572
Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.
- https://blog.torproject.org/new-release-tor-03511-0428-0436-security-fixes
- https://blog.torproject.org/new-release-tor-03511-0428-0436-security-fixes
- https://gitlab.torproject.org/tpo/core/tor/-/issues/33119
- https://gitlab.torproject.org/tpo/core/tor/-/issues/33119
- https://trac.torproject.org/projects/tor/wiki/TROVE
- https://trac.torproject.org/projects/tor/wiki/TROVE
Modified: 2024-11-21
CVE-2021-28089
Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.
Modified: 2024-11-21
CVE-2021-28090
Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.
- https://blog.torproject.org/node/2009
- https://blog.torproject.org/node/2009
- https://bugs.torproject.org/tpo/core/tor/40316
- https://bugs.torproject.org/tpo/core/tor/40316
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40316
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40316
- FEDORA-2021-e68317166d
- FEDORA-2021-e68317166d
- GLSA-202107-25
- GLSA-202107-25
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15618
Missing escaping of HTML in the Updater of Nextcloud 15.0.5 allowed a reflected XSS when starting the updater from a malicious location.
Modified: 2024-11-21
CVE-2019-15624
Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.
Closed bugs
Лишняя зависимость на php7-devel
Package openhantek updated to version 2.03-alt1 for branch sisyphus in task 229066.
Closed bugs
update OpenHantek to v 2.03
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-11323
HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=8ef706502aa2000531d36e4ac56dbdc7c30f718d
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=8ef706502aa2000531d36e4ac56dbdc7c30f718d
- https://www.mail-archive.com/haproxy%40formilux.org/msg33410.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg33410.html