ALT-PU-2025-6362-3
Closed vulnerabilities
BDU:2021-01891
Уязвимость функции dirvote_add_signatures_to_pending_consensus() браузера Tor, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01909
Уязвимость функции dump_desc() браузера Tor, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04714
Уязвимость анонимного веб-браузера Tor, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04715
Уязвимость функцией SSL-Proxy анонимного веб-браузера Tor, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04716
Уязвимость анонимного веб-браузера Tor, связанная с ошибками авторизации, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-28089
Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.
Modified: 2024-11-21
CVE-2021-28090
Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.
- https://blog.torproject.org/node/2009
- https://blog.torproject.org/node/2009
- https://bugs.torproject.org/tpo/core/tor/40316
- https://bugs.torproject.org/tpo/core/tor/40316
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40316
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40316
- FEDORA-2021-e68317166d
- FEDORA-2021-e68317166d
- GLSA-202107-25
- GLSA-202107-25
Modified: 2024-11-21
CVE-2021-34548
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
- http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html
- http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html
- https://blog.torproject.org/node/2041
- https://blog.torproject.org/node/2041
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40389
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40389
- GLSA-202107-25
- GLSA-202107-25
Modified: 2024-11-21
CVE-2021-34549
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
Modified: 2024-11-21
CVE-2021-34550
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
Modified: 2024-11-19
CVE-2021-3838
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
Modified: 2024-11-21
CVE-2021-38385
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
Modified: 2025-04-07
CVE-2023-23589
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
- https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc
- https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40730
- https://gitlab.torproject.org/tpo/core/tor/-/issues/40730
- https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes
- https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes
- [debian-lts-announce] 20230128 [SECURITY] [DLA 3286-1] tor security update
- [debian-lts-announce] 20230128 [SECURITY] [DLA 3286-1] tor security update
- FEDORA-2023-1254a1fc28
- FEDORA-2023-1254a1fc28
- FEDORA-2023-c290171664
- FEDORA-2023-c290171664
- GLSA-202305-11
- GLSA-202305-11
- DSA-5320
- DSA-5320