... | ... | @@ -44,9 +44,9 @@ release the patch once we believe it works. |
|
|
| TROVE-2020-005 | tor#40080, tor#40086 | Medium | 0.2.7.2-alpha | 0.4.5.1-alpha, 0.4.4.6, 0.4.3.7, 0.3.5.12 | Race condition allows extending over non-canonical connections |
|
|
|
| TROVE-2021-001 | tor#40304 | High | 0.2.2.1-alpha | 0.3.5.14, 0.4.4.8, 0.4.5.7, 0.4.6.1-alpha | CPU-based DoS from invalid directory data | CVE-2021-28089 |
|
|
|
| TROVE-2021-002 | tor#40316 | Medium | 0.2.2.6-alpha | 0.3.5.14, 0.4.4.8, 0.4.5.7, 0.4.6.1-alpha | Crash-based DoS, authorities only | CVE-2021-28090 |
|
|
|
| TROVE-2021-003 | tor#40389 | Medium |
|
|
|
| TROVE-2021-004 | tor#40390 | Low |
|
|
|
| TROVE-2021-005 | tor#40391 | Medium |
|
|
|
| TROVE-2021-006 | tor#40392 | High |
|
|
|
| TROVE-2021-003 | tor#40389 | Medium | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 |
|
|
|
| TROVE-2021-004 | tor#40390 | Low | 0.2.8.1-alpha | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 | Incorrect error check on RAND_bytes |
|
|
|
| TROVE-2021-005 | tor#40391 | Medium | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 |
|
|
|
| TROVE-2021-006 | tor#40392 | High | | 0.3.5.15, 0.4.4.9, 0.4.5.9, 0.4.6.5 |
|
|
|
|
|
|
Remember: please get CVE-Ids for everything of severity Medium or higher. To get a CVE-Id, visit https://cveform.mitre.org/ . |
|
|
\ No newline at end of file |