... | ... | @@ -46,7 +46,7 @@ release the patch once we believe it works. |
|
|
| TROVE-2021-002 | tor#40316 | Medium | 0.2.2.6-alpha | 0.3.5.14, 0.4.4.8, 0.4.5.7, 0.4.6.1-alpha | Crash-based DoS, authorities only | CVE-2021-28090 |
|
|
|
| TROVE-2021-003 | tor#40389 | Medium | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | "Incorrect check in protocol"
|
|
|
| TROVE-2021-004 | tor#40390 | Low | 0.2.8.1-alpha | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | Incorrect error check on RAND_bytes |
|
|
|
| TROVE-2021-005 | tor#40391 | Medium | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | CPU-based DOS against relays
|
|
|
| TROVE-2021-006 | tor#40392 | High | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | Crash-based DOS against clients
|
|
|
| TROVE-2021-005 | tor#40391 | Medium | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | "CPU-based DOS against relays"
|
|
|
| TROVE-2021-006 | tor#40392 | High | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | "Crash-based DOS against clients"
|
|
|
|
|
|
Remember: please get CVE-Ids for everything of severity Medium or higher. To get a CVE-Id, visit https://cveform.mitre.org/ . |
|
|
\ No newline at end of file |