Public bug reported:

A buffer overrun can crash Tor 0.2.4.27 (trusty), 0.2.7.6 (xenial),
0.2.8.8 (yakkety) causing d-o-s.

Tor treats "the contents of a buffer chunk as if they were a NUL-
terminated string. At least one such bug seems to be present in all
currently used versions of Tor, and would allow an attacker to remotely
crash most Tor instances, especially those compiled with extra compiler
hardening."

** Affects: vidalia
     Importance: Unknown
         Status: Unknown

** Affects: tor (Ubuntu)
     Importance: Critical
     Assignee: Chad Miller (cmiller)
         Status: Confirmed

** Changed in: tor (Ubuntu)
     Assignee: (unassigned) => Chad Miller (cmiller)

** Changed in: tor (Ubuntu)
       Status: New => Confirmed

** Changed in: tor (Ubuntu)
   Importance: Undecided => Critical

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662548

Title:
  tor 0.2.7.6-1ubuntu1 has memory-access severe bug TROVE-2016-10-001

To manage notifications about this bug go to:
https://bugs.launchpad.net/vidalia/+bug/1662548/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to