[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #17698 [Tor]: Avoid passing an uninitialised buffer to OpenSSL
#17698: Avoid passing an uninitialised buffer to OpenSSL
------------------------+--------------------------------
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.2.8.x-final
Component: Tor | Version: Tor: unspecified
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Sponsor:
------------------------+--------------------------------
Don't pass potentially uninitialised buffers to RAND_bytes.
(OpenSSL uses the buffer as an entropy source, which is
undefined behaviour on uninitialised memory.)
Bugfix on tor 0.0.6rc4, commit f6dbe5a0d42d / svn:r1717
on 27 Apr 2004.
See my branch rand-input-uninitialised, based on bug17686_v2_027.
https://github.com/teor2345/tor.git
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17698>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs