ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2024-11-16 09:04:44 +00:00
parent a294c4088d
commit 5d06ae0f10
2 changed files with 16 additions and 2 deletions

View File

@ -40,7 +40,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades tor to version 0.4.7.8-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02936: Уязвимость анонимного веб-браузера Tor, связанная с некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2021-3838: description unavailable\n\n * CVE-2022-33903: Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.",
"Description": "This update upgrades tor to version 0.4.7.8-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02936: Уязвимость анонимного веб-браузера Tor, связанная с некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2021-3838: DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.\n\n * CVE-2022-33903: Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
@ -63,6 +63,13 @@
}
],
"CVEs": [
{
"ID": "CVE-2021-3838",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3838",
"Impact": "None",
"Public": "20241115"
},
{
"ID": "CVE-2022-33903",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",

View File

@ -45,7 +45,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades tor to version 0.4.7.8-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02936: Уязвимость анонимного веб-браузера Tor, связанная с некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2021-3838: description unavailable\n\n * CVE-2022-33903: Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.",
"Description": "This update upgrades tor to version 0.4.7.8-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02936: Уязвимость анонимного веб-браузера Tor, связанная с некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2021-3838: DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.\n\n * CVE-2022-33903: Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
@ -68,6 +68,13 @@
}
],
"CVEs": [
{
"ID": "CVE-2021-3838",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3838",
"Impact": "None",
"Public": "20241115"
},
{
"ID": "CVE-2022-33903",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",