diff options
author | Nick Mathewson <nickm@torproject.org> | 2011-06-06 16:18:24 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2011-06-06 16:18:24 -0400 |
commit | 9e3fc5f61685f937d76e60c5fa1781b80aa5bf68 (patch) | |
tree | a0ed38fbbf3f5534352afba28e3bc97366b82c31 /changes | |
parent | 83e3975c8bebb3f0aeb95d672e09d31797f7bd6a (diff) | |
parent | 42e4e156d95a1c28a666a5346d491c4ed71435dd (diff) | |
download | tor-9e3fc5f61685f937d76e60c5fa1781b80aa5bf68.tar.gz tor-9e3fc5f61685f937d76e60c5fa1781b80aa5bf68.zip |
Merge branch 'bug3306_nm_squashed' into maint-0.2.2
Diffstat (limited to 'changes')
-rw-r--r-- | changes/bug3306 | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/changes/bug3306 b/changes/bug3306 new file mode 100644 index 0000000000..f868a24af0 --- /dev/null +++ b/changes/bug3306 @@ -0,0 +1,9 @@ + o Minor bugfixes: + - Make our crypto_rand_int() function check the value of its input + correctly. Previously, it accepted values up to UINT_MAX, but + could return a negative number if given a value above INT_MAX+1. + Found by George Kadianakis. Fixes bug 3306; bugfix on 0.2.2pre14. + + - Avoid a segfault when reading a malformed circuit build state + with more than INT_MAX entries. Found by wanoskarnet. Bugfix on + 0.2.2.4-alpha. |