Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6260-1 | tor security update |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Double-Close Circuit Queue Crash in Tor Client |
Thu, 07 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tor before 0.4.9.7, when circuit queue memory pressure exists, can experience a client crash because of a double close of a circuit, aka TROVE-2026-009. | |
| First Time appeared |
Torproject
Torproject tor |
|
| Weaknesses | CWE-837 | |
| CPEs | cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Torproject
Torproject tor |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-07T14:58:24.830Z
Reserved: 2026-05-07T03:09:50.703Z
Link: CVE-2026-44601
Updated: 2026-05-07T13:56:49.514Z
Status : Analyzed
Published: 2026-05-07T04:16:35.030
Modified: 2026-05-08T17:07:19.250
Link: CVE-2026-44601
No data.
OpenCVE Enrichment
Updated: 2026-05-07T06:00:16Z
Debian DSA