diff options
author | Nick Mathewson <nickm@torproject.org> | 2011-06-06 16:18:24 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2011-06-06 16:18:24 -0400 |
commit | 9e3fc5f61685f937d76e60c5fa1781b80aa5bf68 (patch) | |
tree | a0ed38fbbf3f5534352afba28e3bc97366b82c31 | |
parent | 83e3975c8bebb3f0aeb95d672e09d31797f7bd6a (diff) | |
parent | 42e4e156d95a1c28a666a5346d491c4ed71435dd (diff) | |
download | tor-9e3fc5f61685f937d76e60c5fa1781b80aa5bf68.tar.gz tor-9e3fc5f61685f937d76e60c5fa1781b80aa5bf68.zip |
Merge branch 'bug3306_nm_squashed' into maint-0.2.2
-rw-r--r-- | changes/bug3306 | 9 | ||||
-rw-r--r-- | src/common/crypto.c | 5 | ||||
-rw-r--r-- | src/or/circuitbuild.c | 10 |
3 files changed, 21 insertions, 3 deletions
diff --git a/changes/bug3306 b/changes/bug3306 new file mode 100644 index 0000000000..f868a24af0 --- /dev/null +++ b/changes/bug3306 @@ -0,0 +1,9 @@ + o Minor bugfixes: + - Make our crypto_rand_int() function check the value of its input + correctly. Previously, it accepted values up to UINT_MAX, but + could return a negative number if given a value above INT_MAX+1. + Found by George Kadianakis. Fixes bug 3306; bugfix on 0.2.2pre14. + + - Avoid a segfault when reading a malformed circuit build state + with more than INT_MAX entries. Found by wanoskarnet. Bugfix on + 0.2.2.4-alpha. diff --git a/src/common/crypto.c b/src/common/crypto.c index d8e6619c9f..851f11bf3b 100644 --- a/src/common/crypto.c +++ b/src/common/crypto.c @@ -2145,13 +2145,14 @@ crypto_rand(char *to, size_t n) } /** Return a pseudorandom integer, chosen uniformly from the values - * between 0 and <b>max</b>-1. */ + * between 0 and <b>max</b>-1 inclusive. <b>max</b> must be between 1 and + * INT_MAX+1, inclusive. */ int crypto_rand_int(unsigned int max) { unsigned int val; unsigned int cutoff; - tor_assert(max < UINT_MAX); + tor_assert(max <= ((unsigned int)INT_MAX)+1); tor_assert(max > 0); /* don't div by 0 */ /* We ignore any values that are >= 'cutoff,' to avoid biasing the diff --git a/src/or/circuitbuild.c b/src/or/circuitbuild.c index 3f08448159..6d7e71194e 100644 --- a/src/or/circuitbuild.c +++ b/src/or/circuitbuild.c @@ -678,7 +678,15 @@ circuit_build_times_shuffle_and_store_array(circuit_build_times_t *cbt, log_notice(LD_CIRC, "The number of circuit times that this Tor version " "uses to calculate build times is less than the number stored " "in your state file. Decreasing the circuit time history from " - "%d to %d.", num_times, CBT_NCIRCUITS_TO_OBSERVE); + "%lu to %d.", (unsigned long)num_times, + CBT_NCIRCUITS_TO_OBSERVE); + } + + if (n > INT_MAX-1) { + log_warn(LD_CIRC, "For some insane reasons, you had %lu circuit build " + "observations in your state file. That's far too many; probably " + "there's a bug here.", (unsigned long)n); + n = INT_MAX-1; } /* This code can only be run on a compact array */ |