aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2017-06-27 11:04:44 -0400
committerNick Mathewson <nickm@torproject.org>2017-06-27 11:04:44 -0400
commita8fcb6aa1a9f60d8335c2c9d775a61e61b2cc278 (patch)
tree5edcf2c2894f0585421b45f280460c6f9bc300cb
parent37dabc0274206cd187b1fc750f09674abe6e5506 (diff)
parent9a0fd2dbb187e898f63064c483776538a90562f1 (diff)
downloadtor-a8fcb6aa1a9f60d8335c2c9d775a61e61b2cc278.tar.gz
tor-a8fcb6aa1a9f60d8335c2c9d775a61e61b2cc278.zip
Merge branch 'maint-0.2.7-redux' into release-0.2.7-redux
-rw-r--r--changes/bug2273712
-rw-r--r--src/or/connection_or.c4
2 files changed, 15 insertions, 1 deletions
diff --git a/changes/bug22737 b/changes/bug22737
new file mode 100644
index 0000000000..f0de8e6c41
--- /dev/null
+++ b/changes/bug22737
@@ -0,0 +1,12 @@
+ o Minor bugfixes (defensive programming, undefined behavior):
+
+ - Fix a memset() off the end of an array when packing cells. This
+ bug should be harmless in practice, since the corrupted bytes
+ are still in the same structure, and are always padding bytes,
+ ignored, or immediately overwritten, depending on compiler
+ behavior. Nevertheless, because the memset()'s purpose is to
+ make sure that any other cell-handling bugs can't expose bytes
+ to the network, we need to fix it. Fixes bug 22737; bugfix on
+ 0.2.4.11-alpha. Fixes CID 1401591.
+
+
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index a967c93aca..a45d23aac6 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -430,9 +430,11 @@ cell_pack(packed_cell_t *dst, const cell_t *src, int wide_circ_ids)
set_uint32(dest, htonl(src->circ_id));
dest += 4;
} else {
+ /* Clear the last two bytes of dest, in case we can accidentally
+ * send them to the network somehow. */
+ memset(dest+CELL_MAX_NETWORK_SIZE-2, 0, 2);
set_uint16(dest, htons(src->circ_id));
dest += 2;
- memset(dest+CELL_MAX_NETWORK_SIZE-2, 0, 2); /*make sure it's clear */
}
set_uint8(dest, src->command);
memcpy(dest+1, src->payload, CELL_PAYLOAD_SIZE);