CVE-2021-34548
Summary
| CVE | CVE-2021-34548 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-29 11:15:00 UTC |
| Updated | 2023-08-08 14:21:00 UTC |
| Description | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Torproject |
Tor |
All |
All |
All |
All |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178676 Debian Security Update for tor (DSA 4932-1)
- 179510 Debian Security Update for tor (CVE-2021-34548)
- 281659 Fedora Security Update for tor (FEDORA-2021-ff4ad9825a)
- 281660 Fedora Security Update for tor (FEDORA-2021-1b60c984e5)
- 501260 Alpine Linux Security Update for tor
- 710051 Gentoo Linux Tor Multiple vulnerabilities (GLSA 202107-25)
- 750726 OpenSUSE Security Update for tor (openSUSE-SU-2021:0926-1)