[tor-bugs] #17868 [Core Tor/Tor]: base64_decode_nopad() destination buffer length problem

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Apr 7 22:28:49 UTC 2017


#17868: base64_decode_nopad() destination buffer length problem
-----------------------------+------------------------------------
 Reporter:  dgoulet          |          Owner:  nikkolasg
     Type:  defect           |         Status:  needs_review
 Priority:  Medium           |      Milestone:  Tor: 0.3.1.x-final
Component:  Core Tor/Tor     |        Version:
 Severity:  Normal           |     Resolution:
 Keywords:  review-group-12  |  Actual Points:
Parent ID:  #19531           |         Points:  2
 Reviewer:  dgoulet          |        Sponsor:  SponsorR-can
-----------------------------+------------------------------------
Changes (by catalyst):

 * status:  needs_revision => needs_review


Comment:

 Proposed (somewhat more minimalist) fix in
 https://gitlab.com/argonblue/tor/merge_requests/3
 This deletes `base64_decode_nopad()`, makes `base64_decode()` check the
 actual decoded length instead of making an overly conservative estimate,
 and removes the now-obsolete `SR_COMMIT_LEN` workaround in #16943.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17868#comment:41>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list