Upstream information

CVE-2017-8823 at MITRE

Description

In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, there is a use-after-free in onion service v2 during intro-point expiration because the expiring list is mismanaged in certain error cases, aka TROVE-2017-013.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.1
Vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Access Vector Network
Access Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
SUSE Bugzilla entry: 1070849 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub for SUSE Linux Enterprise 12
  • tor >= 0.3.1.9-8.1
  • tor-debuginfo >= 0.3.1.9-8.1
  • tor-debugsource >= 0.3.1.9-8.1
Patchnames:
openSUSE-2017-1336
openSUSE Leap 42.2
  • tor >= 0.2.9.14-8.12.1
  • tor-debuginfo >= 0.2.9.14-8.12.1
  • tor-debugsource >= 0.2.9.14-8.12.1
Patchnames:
openSUSE-2017-1336
openSUSE Leap 42.3
  • tor >= 0.3.0.13-9.1
  • tor-debuginfo >= 0.3.0.13-9.1
  • tor-debugsource >= 0.3.0.13-9.1
Patchnames:
openSUSE-2017-1336