
Cloud Vulnerability DB
A community-led vulnerabilities database
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 contains a vulnerability identified as CVE-2020-10593 (also known as TROVE-2020-004). The vulnerability occurs in the circpad_setup_machine_on_circ function because a circuit-padding machine can be negotiated twice on the same circuit (CVE Details).
The vulnerability is a memory leak condition that occurs when circpad_setup_machine_on_circ() is reached with an inconsistent internal configuration. While the function logs a bug warning, it fails to free an object that is replaced, resulting in a memory leak condition (Tor Bug).
The vulnerability allows remote attackers to cause a Denial of Service condition through a memory leak in the affected Tor versions (Gentoo Security).
Users are advised to upgrade to Tor version 0.3.5.10, 0.4.1.9, or 0.4.2.7 or later, depending on their current version branch. No workaround is available for this vulnerability (OpenSUSE Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."