- Jun 10, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
There's an assertion failure that can occur if a connection has optimistic data waiting, and then the connect() call returns 0 on the first attempt (rather than -1 and EINPROGRESS). That latter behavior from connect() appears to be an (Open?)BSDism when dealing with remote addresses in some cases. (At least, I've only seen it reported with the BSDs under libevent, even when the address was 127.0.0.1. And we've only seen this problem in Tor with OpenBSD.) Fixes bug 9017; bugfix on 0.2.3.1-alpha, which first introduced optimistic data. (Although you could also argue that the commented-out connection_start_writing in 155c9b80 back in 2002 is the real source of the issue.)
-
- Jun 05, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- May 20, 2013
-
-
Nick Mathewson authored
-
- May 13, 2013
-
-
Karsten Loesing authored
-
- May 09, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This is a fix for bug 8844, where eugenis correctly notes that there's a sentinel value at the end of the list-of-freelists that's never actually checked. It's a bug since the first version of the chunked buffer code back in 0.2.0.16-alpha. This would probably be a crash bug if it ever happens, but nobody's ever reported something like this, so I'm unsure whether it can occur. It would require write_to_buf, write_to_buf_zlib, read_to_buf, or read_to_buf_tls to get an input size of more than 32K. Still, it's a good idea to fix this kind of thing!
-
- Apr 12, 2013
-
-
Nick Mathewson authored
Fix for bug 5650. Also, if we get a WANTREAD while reading while writing, make sure we're reading.
-
- Apr 08, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Mar 18, 2013
-
-
Nick Mathewson authored
-
- Mar 11, 2013
-
-
Nick Mathewson authored
-
- Mar 07, 2013
-
-
Karsten Loesing authored
-
- Mar 01, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Fixes bug 8377; bugfix on 0.2.1.3-alpha.
-
- Feb 12, 2013
-
-
Nick Mathewson authored
(Cherry-picked from fc35ee49)
-
- Feb 11, 2013
-
-
Nick Mathewson authored
This fixes a crash bug if we fail to generate an extrainfo descriptor. Fixes bug 8208; bugfix on 0.2.3.16-alpha.
-
- Feb 08, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Jan 15, 2013
-
-
Nick Mathewson authored
-
- Jan 14, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Otherwise, it's possible to create streams or circuits with these bogus IDs, leading to orphaned circuits or streams, or to ones that can cause bandwidth DOS problems. Fixes bug 7889; bugfix on all released Tors.
-
- Jan 05, 2013
-
-
Karsten Loesing authored
-
- Dec 13, 2012
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Nov 13, 2012
-
-
Roger Dingledine authored
Fix a harmless bug when opting against publishing a relay descriptor because DisableNetwork is set. Fixes bug 7464; bugfix on 0.2.3.9-alpha.
-
- Nov 09, 2012
-
-
Nick Mathewson authored
It broke linking on tor-resolve.c, and it's not actually sanitizing anything sensitive. Fix for bug 7420; bug not on ony released Tor.
-
- Nov 08, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Apparently some compilers like to eliminate memset() operations on data that's about to go out-of-scope. I've gone with the safest possible replacement, which might be a bit slow. I don't think this is critical path in any way that will affect performance, but if it is, we can work on that in 0.2.4. Fixes bug 7352.
-
- Oct 24, 2012
-
-
Nick Mathewson authored
If we completed the handshake for the v2 link protocol but wound up negotiating the wong protocol version, we'd become so confused about what part of the handshake we were in that we'd promptly die with an assertion. This is a fix for CVE-2012-2250; it's a bugfix on 0.2.3.6-alpha. All servers running that version or later should really upgrade. Bug and fix from "some guy from France." I tweaked his code slightly to make it log the IP of the offending node.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Conflicts: src/test/test_containers.c
-
Nick Mathewson authored
-
Nick Mathewson authored
The implementation we added has a tendency to crash with lists of 0 or one element. That can happen if we get a consensus vote, v2 consensus, consensus, or geoip file with 0 or 1 element. There's a DOS opportunity there that authorities could exploit against one another, and which an evil v2 authority could exploit against anything downloading v2 directory information.. This fix is minimalistic: It just adds a special-case for 0- and 1-element lists. For 0.2.4 (the current alpha series) we'll want a better patch. This is bug 7191; it's a fix on 0.2.0.10-alpha.
-
- Oct 23, 2012
-
-
Roger Dingledine authored
Clients now consider the ClientRejectInternalAddresses config option when using a microdescriptor consensus stanza to decide whether an exit relay would allow exiting to an internal address. Fixes bug 7190; bugfix on 0.2.3.1-alpha.
-
Nick Mathewson authored
Our implementation of parse_short_policy was screwed up: it would ignore the last character of every short policy. Obviously, that's broken. This patch fixes the busted behavior, and adds a bunch of unit tests to make sure the rest of that function is okay. Fixes bug 7192; fix on 0.2.3.1-alpha.
-