A vulnerability in Tor was reported [1] that could allow a malicious remote attacker to cause a denial of service. This vulnerability is due to a boundary error within the policy_summarize() function in src/or/policies.c which can be exploited to crash a Tor directory authority. Upstream announced the release of 0.2.1.30 [2] that is noted to correct this flaw. [1] http://secunia.com/advisories/43548/ [2] https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html
Created tor tracking bugs for this issue Affects: fedora-13 [bug 705193] Affects: fedora-14 [bug 705194] Affects: epel-5 [bug 671263]
The upstream fix is here: https://gitweb.torproject.org/tor.git/commitdiff/43414eb98821d3b5c6c65181d7545ce938f82c8e
This was assigned CVE-2011-1924.
fixed long time ago