![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.817774 |
Category: | Fedora Local Security Checks |
Title: | Fedora: Security Advisory for tor (FEDORA-2021-52d6a75d28) |
Summary: | The remote host is missing an update for the 'tor'; package(s) announced via the FEDORA-2021-52d6a75d28 advisory. |
Description: | Summary: The remote host is missing an update for the 'tor' package(s) announced via the FEDORA-2021-52d6a75d28 advisory. Vulnerability Insight: The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor', s users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network. Affected Software/OS: 'tor' package(s) on Fedora 33. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-38385 https://security.gentoo.org/glsa/202305-11 https://blog.torproject.org |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |