[tor-bugs] #4413 [Tor Relay]: Non-triggerable integer overflow in crypto_random_hostname()
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Tue Jan 10 05:16:19 UTC 2012
#4413: Non-triggerable integer overflow in crypto_random_hostname()
--------------------------+-------------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: reopened
Priority: minor | Milestone: Tor: unspecified
Component: Tor Relay | Version:
Resolution: | Keywords: easy
Parent: | Points:
Actualpoints: |
--------------------------+-------------------------------------------------
Changes (by Sebastian):
* status: closed => reopened
* resolution: fixed =>
Comment:
Looks like the tweak broke the build unfortunately for recent versions of
openssl. bug4413 in my repo for a fix. Also spotted by xiando on #tor-dev
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4413#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list