Unrated severityNVD Advisory· Published Jun 29, 2021· Updated Aug 4, 2024
CVE-2021-34548
CVE-2021-34548
Description
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
Affected products
4- Tor/Tordescription
- osv-coords3 versionspkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/tor&distro=openSUSE%20Tumbleweedpkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP2
< 0.4.5.9-lp152.2.12.1+ 2 more
- (no CPE)range: < 0.4.5.9-lp152.2.12.1
- (no CPE)range: < 0.4.6.7-2.2
- (no CPE)range: < 0.4.5.9-bp152.2.12.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- security.gentoo.org/glsa/202107-25mitrevendor-advisoryx_refsource_GENTOO
- packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.htmlmitrex_refsource_MISC
- blog.torproject.org/node/2041mitrex_refsource_CONFIRM
- gitlab.torproject.org/tpo/core/tor/-/issues/40389mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.