CVE-2015-2689

Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.

Date published : 2020-01-24

https://lists.torproject.org/pipermail/tor-talk/2015-March/037281.html

https://trac.torproject.org/projects/tor/ticket/14129