UBUNTU-CVE-2020-8516

Source
https://ubuntu.com/security/CVE-2020-8516
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-8516
Withdrawn
2025-06-23T15:53:37Z
Published
2020-02-02T13:15:00Z
Modified
2020-02-02T13:15:00Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

** DISPUTED ** The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability.

References

Affected packages

Ubuntu:20.04:LTS
tor

Package

Name
tor
Purl
pkg:deb/ubuntu/tor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.4.1.5-1
0.4.1.5-1build1
0.4.1.6-1
0.4.2.5-1
0.4.2.6-1
0.4.2.7-1

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json"
Ubuntu:22.04:LTS
tor

Package

Name
tor
Purl
pkg:deb/ubuntu/tor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.4.5.9-1
0.4.6.8-1
0.4.6.8-1build1
0.4.6.9-1
0.4.6.10-1

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json"
Ubuntu:24.04:LTS
tor

Package

Name
tor
Purl
pkg:deb/ubuntu/tor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.4.8.4-2
0.4.8.7-1
0.4.8.9-1
0.4.8.10-1
0.4.8.10-1build1
0.4.8.10-1build2

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json"
Ubuntu:Pro:14.04:LTS
tor

Package

Name
tor
Purl
pkg:deb/ubuntu/tor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.2.3.25-1
0.2.4.19-1
0.2.4.20-1
0.2.4.27-1build0.14.04.1
0.2.4.27-1ubuntu0.1
0.2.4.27-1ubuntu0.1+esm1
0.2.4.27-1ubuntu0.1+esm2

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json"
Ubuntu:Pro:16.04:LTS
tor

Package

Name
tor
Purl
pkg:deb/ubuntu/tor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.2.6.10-1ubuntu2
0.2.7.6-1ubuntu1
0.2.9.11-1ubuntu1~16.04.1
0.2.9.14-1ubuntu1~16.04.1
0.2.9.14-1ubuntu1~16.04.2
0.2.9.14-1ubuntu1~16.04.3
0.2.9.14-1ubuntu1~16.04.3+esm1

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json"
Ubuntu:Pro:18.04:LTS
tor

Package

Name
tor
Purl
pkg:deb/ubuntu/tor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.3.0.10-1
0.3.1.8-2
0.3.1.9-1
0.3.2.9-1
0.3.2.9-1build1
0.3.2.10-1
0.3.2.10-1ubuntu0.1
0.3.2.10-1ubuntu0.2~esm1
0.3.2.10-1ubuntu0.2~esm2

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-8516.json"