CVE-2020-8516
02.02.2020, 13:15
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerabilityEnginsight
Vendor | Product | Version |
---|---|---|
torproject | tor | 𝑥 ≤ 0.4.1.8 |
torproject | tor | 0.4.2.0 ≤ 𝑥 ≤ 0.4.2.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References