Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
CPE | Name | Operator | Version |
---|---|---|---|
tor | eq | 0.2.4.15 rc | |
tor | eq | 0.2.4.6 alpha | |
tor | eq | 0.2.4.1 alpha | |
tor | eq | 0.2.4.2 alpha | |
tor | eq | 0.2.4.12 alpha | |
tor | eq | 0.2.4.9 alpha | |
tor | eq | 0.2.4.4 alpha | |
tor | eq | 0.2.4.14 alpha | |
tor | eq | 0.2.4.8 alpha | |
tor | eq | 0.2.4.17 rc |