From: Nick Mathewson Date: Tue, 10 Jan 2012 00:18:48 +0000 (-0500) Subject: Revise bug4413 changes file X-Git-Tag: tor-0.2.3.11-alpha~40 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=489db38229074e3d31d65ac9e60407ddb4826789;p=thirdparty%2Ftor.git Revise bug4413 changes file --- diff --git a/changes/bug4413 b/changes/bug4413 index 653ddeb567..673e28f1c6 100644 --- a/changes/bug4413 +++ b/changes/bug4413 @@ -1,2 +1,5 @@ -Minor bugfixes: - - Check for a potential, however unlikely, integer overflow. Fixes bug 4413; Bugfix on 0.2.3.9-alpha. + o Minor bugfixes: + - Fix our implementation of crypto_random_hostname() so it can't + overflow on ridiculously large inputs. (No Tor version has ever + provided this kind of bad inputs, but let's be correct in depth.) + Fixes bug 4413; bugfix on 0.2.2.9-alpha. Fix by Stephen Palmateer.