Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-04-17 | Merge branch 'maint-0.4.0' | teor | |
2019-04-17 | Merge branch 'maint-0.3.5' into maint-0.4.0 | teor | |
2019-04-16 | Merge remote-tracking branch 'tor-github/pr/910' | Nick Mathewson | |
2019-04-16 | Merge remote-tracking branch 'tor-github/pr/884' | Nick Mathewson | |
2019-04-15 | Merge branch 'tor-github/pr/941' | George Kadianakis | |
2019-04-15 | Merge branch 'maint-0.4.0' | George Kadianakis | |
2019-04-15 | Merge branch 'tor-github/pr/948' into maint-0.4.0 | George Kadianakis | |
2019-04-15 | Merge branch 'rust-panic1-035' into rust-panic1-040 | teor | |
2019-04-15 | Merge branch 'rust-panic1-034' into rust-panic1-035 | teor | |
Trivial merge: a blank line was removed between 0.3.4 and 0.3.5. | |||
2019-04-15 | Merge branch 'rust-panic1' into rust-panic1-034 | teor | |
2019-04-12 | changes: file for 30117 | teor | |
2019-04-12 | Travis: expand "make test-stem", so timelimit can signal python on timeout | teor | |
Unlike kill, timelimit can only signal the process it launches. So we need timelimit to launch python, not make. Closes ticket 30117; diagnostic for 29437. | |||
2019-04-12 | Merge branch 'tor-github/pr/908' | George Kadianakis | |
2019-04-12 | Merge branch 'tor-github/pr/754' | George Kadianakis | |
2019-04-12 | crypt_ops: Stop using a separate buffer in ed25519_signature_from_base64() | teor | |
Part of 29960. | |||
2019-04-11 | forward-port the 0.4.0.4-rc changelog | Nick Mathewson | |
2019-04-11 | Merge branch 'maint-0.4.0' | Nick Mathewson | |
2019-04-11 | bump to 0.4.0.4-rc-dev | Nick Mathewson | |
2019-04-11 | Merge remote-tracking branch 'tor-github/pr/913' | Nick Mathewson | |
2019-04-11 | Merge remote-tracking branch 'tor-github/pr/887' | Nick Mathewson | |
2019-04-11 | Merge remote-tracking branch 'tor-github/pr/741' | Nick Mathewson | |
2019-04-11 | Travis: use stem backtrace signals with timelimit | teor | |
Part of 30117. | |||
2019-04-10 | Merge branch 'maint-0.4.0' | Nick Mathewson | |
2019-04-10 | Bump version to 0.4.0.4-rc | Nick Mathewson | |
2019-04-10 | Merge branch 'maint-0.4.0' | Nick Mathewson | |
2019-04-10 | Merge remote-tracking branch 'tor-github/pr/926' into maint-0.4.0 | Nick Mathewson | |
2019-04-10 | Add changes file for #30040. | George Kadianakis | |
2019-04-10 | Prevent double free on huge files with 32 bit. | Tobias Stoeckmann | |
The function compat_getdelim_ is used for tor_getline if tor is compiled on a system that lacks getline and getdelim. These systems should be very rare, considering that getdelim is POSIX. If this system is further a 32 bit architecture, it is possible to trigger a double free with huge files. If bufsiz has been already increased to 2 GB, the next chunk would be 4 GB in size, which wraps around to 0 due to 32 bit limitations. A realloc(*buf, 0) could be imagined as "free(*buf); return malloc(0);" which therefore could return NULL. The code in question considers that an error, but will keep the value of *buf pointing to already freed memory. The caller of tor_getline() would free the pointer again, therefore leading to a double free. This code can only be triggered in dirserv_read_measured_bandwidths with a huge measured bandwith list file on a system that actually allows to reach 2 GB of space through realloc. It is not possible to trigger this on Linux with glibc or other major *BSD systems even on unit tests, because these systems cannot reach so much memory due to memory fragmentation. This patch is effectively based on the penetration test report of cure53 for curl available at https://cure53.de/pentest-report_curl.pdf and explained under section "CRL-01-007 Double-free in aprintf() via unsafe size_t multiplication (Medium)". | |||
2019-04-10 | practracker: accept 4 extra lines due to 30041 | teor | |
2019-04-10 | Merge branch 'maint-0.4.0' | teor | |
2019-04-10 | Merge remote-tracking branch 'tor-github/pr/920' into maint-0.4.0 | teor | |
2019-04-09 | Merge branch 'maint-0.4.0' | Nick Mathewson | |
2019-04-09 | Merge branch 'bug29922_035' into maint-0.4.0 | Nick Mathewson | |
2019-04-09 | Actually I believe this should be an EINVAL. | Nick Mathewson | |
2019-04-09 | Changes file for bug30041 | Nick Mathewson | |
2019-04-09 | Check return value of buf_move_to_buf for error. | Tobias Stoeckmann | |
If the concatenation of connection buffer and the buffer of linked connection exceeds INT_MAX bytes, then buf_move_to_buf returns -1 as an error value. This value is currently casted to size_t (variable n_read) and will erroneously lead to an increasement of variable "max_to_read". This in turn can be used to call connection_buf_read_from_socket to store more data inside the buffer than expected and clogging the connection buffer. If the linked connection buffer was able to overflow INT_MAX, the call of buf_move_to_buf would have previously internally triggered an integer overflow, corrupting the state of the connection buffer. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | |||
2019-04-09 | Protect buffers against INT_MAX datalen overflows. | Tobias Stoeckmann | |
Many buffer functions have a hard limit of INT_MAX for datalen, but this limitation is not enforced in all functions: - buf_move_all may exceed that limit with too many chunks - buf_move_to_buf exceeds that limit with invalid buf_flushlen argument - buf_new_with_data may exceed that limit (unit tests only) This patch adds some annotations in some buf_pos_t functions to guarantee that no out of boundary access could occur even if another function lacks safe guards against datalen overflows. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | |||
2019-04-09 | Merge branch 'maint-0.4.0' | George Kadianakis | |
2019-04-09 | Merge branch 'tor-github/pr/915' into maint-0.4.0 | George Kadianakis | |
2019-04-09 | Merge branch 'maint-0.4.0' | teor | |
2019-04-09 | Merge remote-tracking branch 'tor-github/pr/866' | teor | |
2019-04-09 | Merge remote-tracking branch 'tor-github/pr/862' | teor | |
2019-04-09 | Merge remote-tracking branch 'tor-github/pr/892' into maint-0.4.0 | teor | |
2019-04-09 | manpage: Clarify that Tor does stream isolation between *Port listeners by ↵ | rl1987 | |
default cherry-pick of tor-github/pr/841 to maint-0.4.0. | |||
2019-04-08 | Detect and suppress an additional gmtime() warning in test_util.c | Nick Mathewson | |
Fixes bug 29922; bugfix on 0.2.9.3-alpha when we tried to capture all these warnings. No need to backport any farther than 0.3.5, though -- these warnings don't cause test failures before then. This one was tricky to find because apparently it only happened on _some_ windows builds. | |||
2019-04-08 | Fix SC2006 in minimize.sh | rl1987 | |
2019-04-06 | practracker: accept 6 extra lines in tortls_nss.c:tor_tls_context_new() | teor | |
These lines were added to fix bug 29241. | |||
2019-04-06 | Merge branch 'maint-0.4.0' | teor | |
2019-04-06 | Merge remote-tracking branch 'tor-github/pr/911' into maint-0.4.0 | teor | |
2019-04-06 | changes: Ticket 29241 is actually a bug on NSS in 0.3.5.1-alpha | teor | |