ALT-BU-2019-3645-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-01963
Уязвимость браузера Tor, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01891
Уязвимость функции dirvote_add_signatures_to_pending_consensus() браузера Tor, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01909
Уязвимость функции dump_desc() браузера Tor, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10592
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33120
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33120
Modified: 2024-11-21
CVE-2020-10593
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33619
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33619
Modified: 2024-11-21
CVE-2020-15572
Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.
- https://blog.torproject.org/new-release-tor-03511-0428-0436-security-fixes
- https://gitlab.torproject.org/tpo/core/tor/-/issues/33119
- https://trac.torproject.org/projects/tor/wiki/TROVE
- https://blog.torproject.org/new-release-tor-03511-0428-0436-security-fixes
- https://gitlab.torproject.org/tpo/core/tor/-/issues/33119
- https://trac.torproject.org/projects/tor/wiki/TROVE
Modified: 2024-11-21
CVE-2021-28089
Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.
- https://blog.torproject.org/node/2009
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40304
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/
- https://security.gentoo.org/glsa/202107-25
- https://blog.torproject.org/node/2009
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40304
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/
- https://security.gentoo.org/glsa/202107-25
Modified: 2024-11-21
CVE-2021-28090
Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.
- https://blog.torproject.org/node/2009
- https://bugs.torproject.org/tpo/core/tor/40316
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40316
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/
- https://security.gentoo.org/glsa/202107-25
- https://blog.torproject.org/node/2009
- https://bugs.torproject.org/tpo/core/tor/40316
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40316
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/
- https://security.gentoo.org/glsa/202107-25
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15618
Missing escaping of HTML in the Updater of Nextcloud 15.0.5 allowed a reflected XSS when starting the updater from a malicious location.
Modified: 2024-11-21
CVE-2019-15624
Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html
- https://hackerone.com/reports/508493
- https://nextcloud.com/security/advisory/?id=NC-SA-2019-015
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html
- https://hackerone.com/reports/508493
- https://nextcloud.com/security/advisory/?id=NC-SA-2019-015
Closed bugs
Лишняя зависимость на php7-devel
Package openhantek updated to version 2.03-alt1 for branch sisyphus in task 229066.
Closed bugs
update OpenHantek to v 2.03
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-11323
HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=8ef706502aa2000531d36e4ac56dbdc7c30f718d
- https://www.mail-archive.com/haproxy%40formilux.org/msg33410.html
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=8ef706502aa2000531d36e4ac56dbdc7c30f718d
- https://www.mail-archive.com/haproxy%40formilux.org/msg33410.html