[tor-bugs] #4413 [Tor Relay]: Non-triggerable integer overflow in crypto_random_hostname()

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Jan 10 05:16:19 UTC 2012


#4413: Non-triggerable integer overflow in crypto_random_hostname()
--------------------------+-------------------------------------------------
    Reporter:  asn        |       Owner:                  
        Type:  defect     |      Status:  reopened        
    Priority:  minor      |   Milestone:  Tor: unspecified
   Component:  Tor Relay  |     Version:                  
  Resolution:             |    Keywords:  easy            
      Parent:             |      Points:                  
Actualpoints:             |  
--------------------------+-------------------------------------------------
Changes (by Sebastian):

  * status:  closed => reopened
  * resolution:  fixed =>


Comment:

 Looks like the tweak broke the build unfortunately for recent versions of
 openssl. bug4413 in my repo for a fix. Also spotted by xiando on #tor-dev

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4413#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list