First published: Mon Jun 20 2022(Updated: )
A Denial of Service issue was fixed in tor 0.4.7.8 related to congestion control. RTT estimation can become wedged, seriously degrading congestion control performance on all circuits. This impacts clients, onion services, and relays, and can be triggered remotely by a malicious endpoint. References: <a href="https://gitlab.torproject.org/tpo/core/tor/-/issues/40626">https://gitlab.torproject.org/tpo/core/tor/-/issues/40626</a> <a href="https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html">https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html</a> <a href="https://github.com/torproject/tor/commit/5a25374209689466e10906a77e66ad717a615a02">https://github.com/torproject/tor/commit/5a25374209689466e10906a77e66ad717a615a02</a> <a href="https://github.com/torproject/tor/commit/b0496d40197dd5b4fb7b694c1410082d4e34dda6">https://github.com/torproject/tor/commit/b0496d40197dd5b4fb7b694c1410082d4e34dda6</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | >=0.4.7.1<0.4.7.8 | |
debian/tor | 0.4.5.16-1 0.4.7.16-1 0.4.8.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-33903.
The severity of CVE-2022-33903 is high with a severity value of 7.5.
CVE-2022-33903 allows a denial of service via the wedging of RTT estimation in Tor 0.4.7.x before 0.4.7.8.
The affected software is Tor 0.4.7.x before 0.4.7.8 and Torproject Tor.
To fix CVE-2022-33903, you should upgrade to Tor version 0.4.7.8 or higher.