- Dec 07, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 05, 2015
-
-
Karsten Loesing authored
-
- Dec 01, 2015
-
-
-
The tor_cert_get_checkable_sig function uses the signing key included in the certificate (if available) when a separate public key is not given. When the signature is valid, the tor_cert_checksig function copies the public key from the checkable structure to the public key field of the certificate signing key. In situations where the separate public key is not given but the certificate includes a signing key, the source and destination pointers in the copy operation are equal and invoke undefined behavior. Undefined behaviour is avoided by ensuring both pointers are different.
-
- Nov 25, 2015
-
-
Nick Mathewson authored
Patch from rubiate; fixes bug 17551.
-
- Nov 23, 2015
-
-
David Goulet authored
The wrong list was used when looking up expired intro points in a rend service object causing what we think could be reachability issues and triggering a BUG log. Fixes #16702 Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Nov 20, 2015
-
-
Nick Mathewson authored
-
- Nov 13, 2015
-
-
Nick Mathewson authored
-
- Oct 21, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Without this check, we potentially look up to 3 characters before the start of a malloc'd segment, which could provoke a crash under certain (weird afaik) circumstances. Fixes 17404; bugfix on 0.2.6.3-alpha.
-
Nick Mathewson authored
Closes 17403.
-
Nick Mathewson authored
-
Nick Mathewson authored
Bug 17402.
-
Nick Mathewson authored
The 0.2.8 unit tests provoke this leak, though I don't think it can happen IRL.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Oct 19, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Oct 15, 2015
-
-
Nick Mathewson authored
-
David Goulet authored
Fixes #17354 Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
Nick Mathewson authored
Patch from jamestk; fix on 0.2.5.1-alpha. Fixes 17347.
-
- Oct 09, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Oct 07, 2015
-
-
* Don't assume that every test box has an IPv4 address * Don't assume that every test box has a non-local address Resolves issue #17255 released in unit tests in 0.2.7.3-rc.
-
- Oct 06, 2015
-
-
Nick Mathewson authored
Now that x509_get_not{Before,After} are functions in OpenSSL 1.1 (not yet releasesd), we need to define a variant that takes a const pointer to X509 and returns a const pointer to ASN1_time. Part of 17237. I'm not convinced this is an openssl bug or a tor bug. It might be just one of those things.
-
Nick Mathewson authored
-
- Sep 29, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Ensure that either a valid address is returned in address pointers, or that the address data is zeroed on error. Ensure that free_interface_address6_list handles NULL lists. Add unit tests for get_interface_address* failure cases. Fixes bug #17173. Patch by fk/teor, not in any released version of tor.
-
... that was removed by 31eb486c which first appeared in 0.2.7.3-rc. If tor is running in a ElectroBSD (or FreeBSD) jail it can't get any IP addresses that aren't assigned to the jail by looking at the interfaces and (by design) the get_interface_address6_via_udp_socket_hack() fallback doesn't work either. The missing return code check resulted in tor_addr_is_internal() complaining about a "non-IP address of type 49", due to reading uninitialised memory. Fixes #17173.
-
Nick Mathewson authored
-