Описание
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.2.3.22-rc-1 |
| esm-apps/xenial | released | 0.2.3.22-rc-1 |
| esm-infra-legacy/trusty | released | 0.2.3.22-rc-1 |
| hardy | ignored | end of life |
| lucid | DNE | |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | released | 0.2.3.22-rc-1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
routerlist.c in Tor before 0.2.2.38 uses a different amount of time fo ...
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
EPSS
5 Medium
CVSS2