tor:sid is vulnerable to privilege escalation. A logical error allows unsafe SOCKS4 protocol to be used but not the safe SOCKS4a protocol leading to unsafe traffic being allowed to pass.
gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc
gitlab.torproject.org/tpo/core/tor/-/issues/40730
gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes
lists.debian.org/debian-lts-announce/2023/01/msg00026.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/
lists.fedoraproject.org/archives/list/[email protected]/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/
lists.fedoraproject.org/archives/list/[email protected]/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/
security-tracker.debian.org/tracker/CVE-2023-23589
security.gentoo.org/glsa/202305-11
www.debian.org/security/2023/dsa-5320