SB2018030403 - Use-after-free in tor (Alpine package)
Published: March 4, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2018-0491)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=d17a014c3419283d71293e0cd45a8c7178393632
- https://git.alpinelinux.org/aports/commit/?id=2185d3b8d25a0f2e63d09e74b9c29683ef41bc2d
- https://git.alpinelinux.org/aports/commit/?id=5c3a4c578fcbc65b8e52ec5a804308af5b834eaa
- https://git.alpinelinux.org/aports/commit/?id=e9d50cc6a8aa0e01b165e72e71da208450ade693