Unrated severityNVD Advisory· Published Jun 29, 2021· Updated Aug 4, 2024
CVE-2021-34550
CVE-2021-34550
Description
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
Affected products
4- Tor/Tordescription
- osv-coords3 versionspkg:rpm/opensuse/tor&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/tor&distro=openSUSE%20Tumbleweedpkg:rpm/suse/tor&distro=SUSE%20Package%20Hub%2015%20SP2
< 0.4.5.9-lp152.2.12.1+ 2 more
- (no CPE)range: < 0.4.5.9-lp152.2.12.1
- (no CPE)range: < 0.4.6.7-2.2
- (no CPE)range: < 0.4.5.9-bp152.2.12.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- security.gentoo.org/glsa/202107-25mitrevendor-advisoryx_refsource_GENTOO
- blog.torproject.org/node/2041mitrex_refsource_CONFIRM
- gitlab.torproject.org/tpo/core/tor/-/issues/40392mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.