[tor-bugs] #17868 [Core Tor/Tor]: base64_decode_nopad() destination buffer length problem
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Apr 6 17:26:05 UTC 2017
#17868: base64_decode_nopad() destination buffer length problem
-----------------------------+------------------------------------
Reporter: dgoulet | Owner: nikkolasg
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor: 0.3.1.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: review-group-12 | Actual Points:
Parent ID: #19531 | Points: 2
Reviewer: dgoulet | Sponsor: SponsorR-can
-----------------------------+------------------------------------
Comment (by catalyst):
Further findings:
* Nothing besides test code currently calls `base64_decode_nopad()`
* `base64_decode_nopad()` probably has no reason to exist if
`base64_decode()` is sufficiently lenient
[moved comment from parent ticket]
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17868#comment:40>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list