296,172
Total vulnerabilities in the database
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
Software | From | Fixed in |
---|---|---|
torproject / tor | 0.2.4.15-rc | 0.2.4.15-rc.x |
torproject / tor | 0.2.4.6-alpha | 0.2.4.6-alpha.x |
torproject / tor | 0.2.4.1-alpha | 0.2.4.1-alpha.x |
torproject / tor | 0.2.4.2-alpha | 0.2.4.2-alpha.x |
torproject / tor | 0.2.4.12-alpha | 0.2.4.12-alpha.x |
torproject / tor | 0.2.4.9-alpha | 0.2.4.9-alpha.x |
torproject / tor | 0.2.4.4-alpha | 0.2.4.4-alpha.x |
torproject / tor | 0.2.4.14-alpha | 0.2.4.14-alpha.x |
torproject / tor | 0.2.4.8-alpha | 0.2.4.8-alpha.x |
torproject / tor | 0.2.4.17-rc | 0.2.4.17-rc.x |
torproject / tor | 0.2.4.13-alpha | 0.2.4.13-alpha.x |
torproject / tor | 0.2.4.16-rc | 0.2.4.16-rc.x |
torproject / tor | 0.2.4.3-alpha | 0.2.4.3-alpha.x |
torproject / tor | 0.2.4.5-alpha | 0.2.4.5-alpha.x |
torproject / tor | 0.2.4.18-rc | 0.2.4.18-rc.x |
torproject / tor | 0.2.4.11-alpha | 0.2.4.11-alpha.x |
torproject / tor | 0.2.4.10-alpha | 0.2.4.10-alpha.x |
torproject / tor | 0.2.4.7-alpha | 0.2.4.7-alpha.x |
torproject / tor | - | 0.2.4.19.x |