diff options
author | Nick Mathewson <nickm@torproject.org> | 2021-05-18 08:30:47 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2021-05-18 08:30:47 -0400 |
commit | ee35291a7cdbe51038cbc21ddd5605d7d11c0b94 (patch) | |
tree | 12667fd2eb3f5c654130237b203d561c16807c39 | |
parent | f9a05e464de9b876f21c1fc5563ef628b9057fe8 (diff) | |
download | tor-ee35291a7cdbe51038cbc21ddd5605d7d11c0b94.tar.gz tor-ee35291a7cdbe51038cbc21ddd5605d7d11c0b94.zip |
fixup! Assert on _all_ failures from RAND_bytes().
Whoops; I forgot to add the changes file. :/
-rw-r--r-- | changes/ticket40390 | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/changes/ticket40390 b/changes/ticket40390 new file mode 100644 index 0000000000..b56fa4d9da --- /dev/null +++ b/changes/ticket40390 @@ -0,0 +1,8 @@ + o Major bugfixes (security, defense-in-depth): + - Detect a wider variety of failure conditions from the OpenSSL RNG + code. Previously, we would detect errors from a missing RNG + implementation, but not failures from the RNG code itself. + Fortunately, it appears those failures do not happen in practice + when Tor is using OpenSSL's default RNG implementation. + Fixes bug 40390; bugfix on 0.2.8.1-alpha. This issue is also tracked as + TROVE-2021-004. Reported by Jann Horn at Google's Project Zero. |