Bug ID 1162482
Summary VUL-0: CVE-2020-8516: tor: daemon does not verify that a rendezvous node is known before attempting to connect
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.2
Hardware Other
URL https://smash.suse.de/issue/252273/
OS Other
Status NEW
Severity Minor
Priority P5 - None
Component Basesystem
Assignee bwiedemann@suse.com
Reporter abergmann@suse.com
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

CVE-2020-8516

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify
that a rendezvous node is known before attempting to connect to it, which might
make it easier for remote attackers to discover circuit information.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8516
https://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html


You are receiving this mail because: