= TROVE: Tor Registry Of Vulnerabilities and Exposures =
This page is an experimental registry of Tor software security problems, as we find them. We assign each one a number based on the year, ~~the month,~~ and an index.
For more information on the security policy we're using here, see [https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/SecurityPolicy the network team Security Policy page].
For high-severity issues not already publicly disclosed or being exploited, we will fix them in all affected releases, all at once, as soon as we can. We will notify the world that such a bug exists in advance of the patch, and we will release the patch once we believe it works.
||= TROVE ID =||= Ticket =||= Severity =||= Bug In =||= Fix In =||= Synopsis =||= [https://cve.mitre.org/ CVE Id] =||= extra =||
|| TROVE-2017-009 || #24244 || Medium || 0.2.4 and later || 0.2.5.16, 0.2.8.17, 0.2.9.14, 0.3.0.13, 0.3.1.9, 0.3.2.6-alpha || Replay-cache ineffective for v2 onion services. || CVE-2017-8819 || (Debian: [https://security-tracker.debian.org/tracker/CVE-2017-8819 tracker], [https://www.debian.org/security/2017/dsa-4054 DSA-4054] )
|| TROVE-2017-010 || #24245 || Medium || 0.2.9 and later || 0.2.9.14, 0.3.0.13, 0.3.1.9, 0.3.2.6-alpha || Remote DoS attack against directory authorities || CVE-2017-8820 || (Debian: [https://security-tracker.debian.org/tracker/CVE-2017-8820 tracker], [https://www.debian.org/security/2017/dsa-4054 DSA-4054] )
|| TROVE-2017-011 || #24246 || High || all Tor versions || 0.2.5.16, 0.2.8.17, 0.2.9.14, 0.3.0.13, 0.3.1.9, 0.3.2.6-alpha || An attacker can make Tor ask for a password || CVE-2017-8821 || (Debian: [https://security-tracker.debian.org/tracker/CVE-2017-8821 tracker], [https://www.debian.org/security/2017/dsa-4054 DSA-4054] )
|| TROVE-2017-012 || #24333 || Medium || 0.2.5 and later || 0.2.5.16, 0.2.8.17, 0.2.9.14, 0.3.0.13, 0.3.1.9, 0.3.2.6-alpha || Relays can pick themselves in a circuit path || CVE-2017-8822 || (Debian: [https://security-tracker.debian.org/tracker/CVE-2017-8822 tracker], [https://www.debian.org/security/2017/dsa-4054 DSA-4054] )
|| TROVE-2017-013 || #24430 || High || 0.2.7 and later || 0.2.8.17, 0.2.9.14, 0.3.0.13, 0.3.1.9, 0.3.2.6-alpha || Use-after-free in onion service v2 || CVE-2017-8823 || (Debian: [https://security-tracker.debian.org/tracker/CVE-2017-8823 tracker], [https://www.debian.org/security/2017/dsa-4054 DSA-4054] )