... | @@ -42,7 +42,7 @@ release the patch once we believe it works. |
... | @@ -42,7 +42,7 @@ release the patch once we believe it works. |
|
| TROVE-2020-003 | tor#33137 | Low | 0.3.3.1-alpha | 0.3.5.10, 0.4.1.9, 0.4.2.7, 0.4.3.3-alpha | Local crash, requires authenticated access to control port | n/a | |
|
|
| TROVE-2020-003 | tor#33137 | Low | 0.3.3.1-alpha | 0.3.5.10, 0.4.1.9, 0.4.2.7, 0.4.3.3-alpha | Local crash, requires authenticated access to control port | n/a | |
|
|
| TROVE-2020-004 | tor#33619 | Medium | 0.4.0.1-alpha | 0.4.1.9, 0.4.2.7, 0.4.3.3-alpha | Remotely triggered memory leak | CVE-2020-10593 | |
|
|
| TROVE-2020-004 | tor#33619 | Medium | 0.4.0.1-alpha | 0.4.1.9, 0.4.2.7, 0.4.3.3-alpha | Remotely triggered memory leak | CVE-2020-10593 | |
|
|
| TROVE-2020-005 | tor#40080, tor#40086 | Medium | 0.2.7.2-alpha | 0.4.5.1-alpha, 0.4.4.6, 0.4.3.7, 0.3.5.12 | Race condition allows extending over non-canonical connections |
|
|
| TROVE-2020-005 | tor#40080, tor#40086 | Medium | 0.2.7.2-alpha | 0.4.5.1-alpha, 0.4.4.6, 0.4.3.7, 0.3.5.12 | Race condition allows extending over non-canonical connections |
|
|
| TROVE-2021-001 | tor#40304 | High | - | - | (DoS) |
|
|
| TROVE-2021-001 | tor#40304 | High | - | - | (DoS) | CVE-2021-28089 |
|
|
| TROVE-2021-002 | tor#40316 | Medium | - | - | (DoS, authorities only) |
|
|
| TROVE-2021-002 | tor#40316 | Medium | - | - | (DoS, authorities only) | CVE-2021-28090 |
|
|
|
|
|
|
Remember: please get CVE-Ids for everything of severity Medium or higher. To get a CVE-Id, visit https://cveform.mitre.org/ . |
|
Remember: please get CVE-Ids for everything of severity Medium or higher. To get a CVE-Id, visit https://cveform.mitre.org/ . |