CVE-2012-3517

Publication date 26 August 2012

Last updated 24 July 2024


Ubuntu priority

Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.

Status

Package Ubuntu Release Status
tor 17.04 zesty
Fixed 0.2.3.22-rc-1
16.10 yakkety
Fixed 0.2.3.22-rc-1
16.04 LTS xenial
Fixed 0.2.3.22-rc-1
15.10 wily
Fixed 0.2.3.22-rc-1
15.04 vivid
Fixed 0.2.3.22-rc-1
14.10 utopic
Fixed 0.2.3.22-rc-1
14.04 LTS trusty
Fixed 0.2.3.22-rc-1
13.10 saucy
Fixed 0.2.3.22-rc-1
13.04 raring
Fixed 0.2.3.22-rc-1
12.10 quantal
Fixed 0.2.3.22-rc-1
12.04 LTS precise Ignored end of life
11.10 oneiric Ignored end of life
11.04 natty Ignored end of life
10.04 LTS lucid Not in release
8.04 LTS hardy Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
tor