[tor-bugs] #30920 [Core Tor/Tor]: Detect uint64 overflow in config_parse_units()

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Jun 20 12:18:40 UTC 2019


#30920: Detect uint64 overflow in config_parse_units()
---------------------------+------------------------------------
 Reporter:  nickm          |          Owner:  (none)
     Type:  defect         |         Status:  new
 Priority:  Low            |      Milestone:  Tor: 0.4.2.x-final
Component:  Core Tor/Tor   |        Version:
 Severity:  Minor          |     Resolution:
 Keywords:  easy overflow  |  Actual Points:
Parent ID:                 |         Points:
 Reviewer:                 |        Sponsor:
---------------------------+------------------------------------

Comment (by guigom):

 Replying to [comment:4 teor]:
 > Thanks for offering to help out.
 > That code looks good.

 Thank you.

 > We'll also need some unit tests.

 I will be reading
 https://gitweb.torproject.org/tor.git/tree/doc/HACKING/WritingTests.md
 first as I need to understand how to properly implement unit test for the
 tor project.

 > Do you use git?
 > We accept pull requests on GitHub, or send us the URL of your git
 repository.

 I'll post the link to the PR once submitted.

 > If you can add a changes file, that would also be helpful:
 >
 https://gitweb.torproject.org/tor.git/tree/doc/HACKING/CodingStandards.md#n95

 Sure!

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30920#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list