Bug 1060768 (CVE-2012-2250) - CVE-2012-2250 tor: denial of service via link protocol negotiation
Summary: CVE-2012-2250 tor: denial of service via link protocol negotiation
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2012-2250
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1060769
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-02-03 14:43 UTC by Murray McAllister
Modified: 2020-11-05 10:33 UTC (History)
5 users (show)

Fixed In Version: tor 0.2.3.24-rc
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-11-11 16:05:01 UTC


Attachments (Terms of Use)

Description Murray McAllister 2014-02-03 14:43:42 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-2250 to
the following vulnerability:

Name: CVE-2012-2250
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2250
Assigned: 20120416
Reference: https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog

Tor before 0.2.3.24-rc allows remote attackers to cause a denial of
service (assertion failure and daemon exit) by performing link
protocol negotiation incorrectly.

This issue only affects the version of tor in EPEL 5. Fedora and EPEL 6 are using 0.2.3.25 and are therefore not affected.

Comment 1 Murray McAllister 2014-02-03 14:46:56 UTC
Created tor tracking bugs for this issue:

Affects: epel-5 [bug 1060769]

Comment 2 Fedora Update System 2014-11-09 15:42:29 UTC
tor-0.2.4.25-1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 3 Jamie Nguyen 2014-11-11 16:05:01 UTC
All active branches of Fedora and EPEL now have tor 0.2.4.25 and are thus no longer affected by this bug.


Note You need to log in before you can comment on or make changes to this bug.