{"id":"CVE-2017-8822","details":"In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, relays (that have incompletely downloaded descriptors) can pick themselves in a circuit path, leading to a degradation of anonymity, aka TROVE-2017-012.","modified":"2026-03-12T22:41:14.923685Z","published":"2017-12-03T07:29:00.413Z","related":["MGASA-2017-0444","openSUSE-SU-2017:3201-1","openSUSE-SU-2017:3203-1","openSUSE-SU-2024:11469-1"],"references":[{"type":"ADVISORY","url":"https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516"},{"type":"ADVISORY","url":"https://bugs.torproject.org/24333"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4054"},{"type":"REPORT","url":"https://bugs.torproject.org/21534"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"0.2.5.16"}]},{"events":[{"introduced":"0.2.6"},{"fixed":"0.2.8.17"}]},{"events":[{"introduced":"0.2.9"},{"fixed":"0.2.9.14"}]},{"events":[{"introduced":"0.3.0"},{"fixed":"0.3.0.13"}]},{"events":[{"introduced":"0.3.1"},{"fixed":"0.3.1.9"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-8822.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}