[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4413 [Tor Relay]: Non-triggerable integer overflow in crypto_random_hostname()
#4413: Non-triggerable integer overflow in crypto_random_hostname()
--------------------------+-------------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: reopened
Priority: minor | Milestone: Tor: unspecified
Component: Tor Relay | Version:
Resolution: | Keywords: easy
Parent: | Points:
Actualpoints: |
--------------------------+-------------------------------------------------
Changes (by Sebastian):
* status: closed => reopened
* resolution: fixed =>
Comment:
Looks like the tweak broke the build unfortunately for recent versions of
openssl. bug4413 in my repo for a fix. Also spotted by xiando on #tor-dev
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4413#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs