[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4413 [Tor Relay]: Non-triggerable integer overflow in crypto_random_hostname()
#4413: Non-triggerable integer overflow in crypto_random_hostname()
-----------------------+----------------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: new
Priority: minor | Milestone:
Component: Tor Relay | Version:
Keywords: easy | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Changes (by nickm):
* keywords: => easy
* priority: normal => minor
Comment:
I agree that it is worth fixing for cleanness's sake.
In practice, though, it will never actually trigger, since the point of
this function is to generate a random hostname component. Hostnames
aren't supposed to have any pieces longer than 63 characters. So an
acceptable fix would be to do "if (randlen > 63) randlen = 63;", replacing
63 with an appropriate macro.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4413#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs