Bug 1162482 (CVE-2020-8516) - VUL-0: CVE-2020-8516: tor: daemon does not verify that a rendezvous node is known before attempting to connect
Summary: VUL-0: CVE-2020-8516: tor: daemon does not verify that a rendezvous node is k...
Status: RESOLVED FIXED
Alias: CVE-2020-8516
Product: openSUSE Distribution
Classification: openSUSE
Component: Basesystem (show other bugs)
Version: Leap 15.2
Hardware: Other Other
: P3 - Medium : Minor (vote)
Target Milestone: ---
Assignee: Bernhard Wiedemann
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/252273/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-02-03 10:39 UTC by Alexander Bergmann
Modified: 2020-12-21 04:21 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2020-02-03 10:39:03 UTC
CVE-2020-8516

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify
that a rendezvous node is known before attempting to connect to it, which might
make it easier for remote attackers to discover circuit information.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8516
https://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html
Comment 1 Bernhard Wiedemann 2020-12-21 04:21:47 UTC
tor updates were released to all maintained versions.