CVE-2022-33903
Gentoo Linux Security Advisory 202305-11
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.
Tor versiones 0.4.7.x anteriores a 0.4.7.8, permite una denegación de servicio por medio de la estimación del RTT
An update that fixes one vulnerability is now available. This update for tor fixes the following issues. Tor was updated to 0.4.7.8. Fixed a scenario where RTT estimation can become wedged, seriously degrading congestion control performance on all circuits. This impacts clients, onion services, and relays, and can be triggered remotely by a malicious endpoint. Regenerate fallback directories generated on June 17, 2022. Update the geoip files to match the IPFire Location Database, as retrieved on 2022/06/17. Allow the rseq system call in the sandbox logging bug fixes.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-17 CVE Reserved
- 2022-06-20 CVE Published
- 2024-08-03 CVE Updated
- 2025-05-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2022-33903 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html | 2023-05-03 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202305-11 | 2023-05-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Torproject Search vendor "Torproject" | Tor Search vendor "Torproject" for product "Tor" | >= 0.4.7.1 < 0.4.7.8 Search vendor "Torproject" for product "Tor" and version " >= 0.4.7.1 < 0.4.7.8" | - |
Affected
|