diff options
author | Nick Mathewson <nickm@torproject.org> | 2012-08-09 10:50:11 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2012-08-09 10:50:11 -0400 |
commit | 91b52a259a271df7ceeea6d8bf7adbd4d7e15a6c (patch) | |
tree | b22c8d0f16d23fd0d438917fc177413a1197ab8a /changes | |
parent | 93be3a8822ae791cc8adb78ea7d7e76e4c10db41 (diff) | |
parent | 393944dfb67fb27991e152ec67f74cebbf3a23ba (diff) | |
download | tor-91b52a259a271df7ceeea6d8bf7adbd4d7e15a6c.tar.gz tor-91b52a259a271df7ceeea6d8bf7adbd4d7e15a6c.zip |
Merge remote-tracking branch 'public/bug6252_again' into maint-0.2.3
Diffstat (limited to 'changes')
-rw-r--r-- | changes/bug6252_again | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/changes/bug6252_again b/changes/bug6252_again new file mode 100644 index 0000000000..f7fd00cb38 --- /dev/null +++ b/changes/bug6252_again @@ -0,0 +1,11 @@ + o Security fixes: + - Tear down the circuit if we get an unexpected SENDME cell. Clients + could use this trick to make their circuits receive cells faster + than our flow control would have allowed, or to gum up the network, + or possibly to do targeted memory denial-of-service attacks on + entry nodes. Fixes bug 6252. Bugfix on the 54th commit on Tor -- + from July 2002, before the release of Tor 0.0.0. We had committed + this patch previously, but we had to revert it because of bug 6271. + Now that 6271 is fixed, this appears to work. + + |