A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list. References: https://trac.torproject.org/projects/tor/ticket/24700 https://trac.torproject.org/projects/tor/ticket/25117 https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915
Created tor tracking bugs for this issue: Affects: epel-6 [bug 1553356]