{"id":"UBUNTU-CVE-2017-8823","details":"In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, there is a use-after-free in onion service v2 during intro-point expiration because the expiring list is mismanaged in certain error cases, aka TROVE-2017-013.","modified":"2025-09-08T16:44:15Z","published":"2017-12-03T07:29:00Z","upstream":["CVE-2017-8823"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8823"},{"type":"REPORT","url":"https://bugs.torproject.org/24313"},{"type":"REPORT","url":"https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-8823"}],"affected":[{"package":{"name":"tor","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/tor@0.2.9.14-1ubuntu1~16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.9.14-1ubuntu1~16.04.2"}]}],"versions":["0.2.6.10-1ubuntu2","0.2.7.6-1ubuntu1","0.2.9.11-1ubuntu1~16.04.1","0.2.9.14-1ubuntu1~16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"tor","binary_version":"0.2.9.14-1ubuntu1~16.04.2"},{"binary_name":"tor-geoipdb","binary_version":"0.2.9.14-1ubuntu1~16.04.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-8823.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}