Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
archives.seul.org/or/announce/Dec-2010/msg00000.html
blog.torproject.org/blog/tor-02128-released-security-patches
blog.torproject.org/blog/tor-02220-alpha-out-security-patches
lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html
lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html
secunia.com/advisories/42536
secunia.com/advisories/42667
secunia.com/advisories/42783
secunia.com/advisories/42916
security.gentoo.org/glsa/glsa-201101-02.xml
securitytracker.com/id?1024910
www.debian.org/security/2010/dsa-2136
www.securityfocus.com/bid/45500
www.vupen.com/english/advisories/2010/3290
www.vupen.com/english/advisories/2011/0114
gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog