[tor-bugs] #2352 [Tor Client]: more size_t_ceiling fun

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Jan 12 16:25:52 UTC 2011


#2352: more size_t_ceiling fun
------------------------+---------------------------------------------------
 Reporter:  arma        |       Owner:                    
     Type:  defect      |      Status:  needs_review      
 Priority:  normal      |   Milestone:  Tor: 0.2.2.x-final
Component:  Tor Client  |     Version:                    
 Keywords:              |      Parent:                    
------------------------+---------------------------------------------------

Comment(by cypherpunks):

 Replying to [comment:3 cypherpunks]:
 > While changes for crypto_pk_read_private_key_from_string(): seems like
 BIO_new_mem_buf() returns NULL if memory out or something broken, and
 PEM_read_bio_RSAPrivateKey() does not like it.

 > Seems like Tor do not checks a pointers returned by openssl, like
 BIO_new(). And calling with it openssl's funcs. It's another bug of
 course.

 > Memory out is not a reson to segfault, btw. So better to check, and
 assert correctly inside Tor's malloc.

 That was wrong statement, at least for PEM_read_bio_RSAPrivateKey(). Not
 so obvious but it can check and recover if it was NULL.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2352#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list