** DISPUTED ** The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability.
CVE: (none) => CVE-2020-8516
I think we can close this bugreport as in fact this is "done by design" by tor team. https://lists.torproject.org/pipermail/tor-dev/2020-February/014147.html https://security-tracker.debian.org/tracker/CVE-2020-8516
CC: (none) => mageia
Also our version isn't affected.
Status: NEW => RESOLVEDResolution: (none) => INVALID