vulnerability

Debian: DSA-3694: tor -- security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Oct 18, 2016
Added
Oct 18, 2016
Modified
Feb 19, 2025

Description

It has been discovered that Tor treats the contents of some buffer


chunks as if they were a NUL-terminated string. This issue could


enable a remote attacker to crash a Tor client, hidden service, relay,


or authority.

Solution

debian-upgrade-tor

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.