[tor-bugs] #18089 [Tor]: Tor compiled with --enable-expensive-hardening leads to runtime errors (null pointer passing)

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Jan 19 11:59:08 UTC 2016


#18089: Tor compiled with --enable-expensive-hardening leads to runtime errors
(null pointer passing)
----------------------------------------+----------------------------------
 Reporter:  gk                          |          Owner:
     Type:  defect                      |         Status:  closed
 Priority:  Medium                      |      Milestone:  Tor:
Component:  Tor                         |  0.2.6.x-final
 Severity:  Critical                    |        Version:  Tor: 0.2.3.25
 Keywords:  027-backport, 026-backport  |     Resolution:  fixed
Parent ID:                              |  Actual Points:
  Sponsor:                              |         Points:
----------------------------------------+----------------------------------

Comment (by teor):

 Replying to [comment:8 bugzilla]:
 > Googling brought this: www.viva64.com/en/b/0178/
 > Did you see it?

 It's from 2012, published on the same day Tor introduced memwipe() to
 address the issues described in that post.

 > On topic: it is not good at all to pass NULL argument to function that
 doesn't expect it.
 > sz=0 is allowed but useless.

 As I said, the impact of this depends on unspecified semantics of those
 functions when passed a NULL pointer. This may vary by C library,
 compiler, and/or platform.

 The patch above fixes these issues, and will be included in the next Tor
 0.2.6 and 0.2.7 releases (and the master branch).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18089#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list