Tor suffers from an issue where half-closed connection tracking ignores layer_hint and due to this, entry/middle relays can spoof RELAY_END cells on half-closed streams, which can lead to stream confusion between OP and exit.
0544acc1f8cb71eaae260f7d2c03e6b0c3ebabe6b8549cd83018b8757f7db64a
Gentoo Linux Security Advisory 202107-25 - Multiple vulnerabilities have been found in Tor, the worst of which could result in a Denial of Service condition. Versions less than 0.4.6.5 are affected.
7692df39f84fe213dae815465dde76f6045ee1bf33730aeb443dbfd43e98494e
Debian Linux Security Advisory 4932-1 - Multiple security vulnerabilities were discovered in Tor, a connection-based low-latency anonymous communication system, which could result in denial of service or spoofing.
18890b4acb8c50dc00ffb546ccde2e0a2dc9cfcb68bc471f1cfc92b5084e2ddd
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.
7b6d354e0d9791eace4b51e92211909308297b7aa257993937163d7ee0694cf9