Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.2.4.27-1build0.14.04.1", "binary_name": "tor" }, { "binary_version": "0.2.4.27-1build0.14.04.1", "binary_name": "tor-dbg" }, { "binary_version": "0.2.4.27-1build0.14.04.1", "binary_name": "tor-dbgsym" }, { "binary_version": "0.2.4.27-1build0.14.04.1", "binary_name": "tor-geoipdb" } ] }