diff options
author | Nick Mathewson <nickm@torproject.org> | 2011-07-18 12:43:16 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2011-07-18 12:43:16 -0400 |
commit | be5aa47b55f8a140cc69f34214fb36a187cca46a (patch) | |
tree | 744ad7d7f7db2d2b2dd735aed756e5c10f426c98 /changes/bug3306 | |
parent | 976027210bf13f359cef83cc0f4a35106b7926fa (diff) | |
download | tor-be5aa47b55f8a140cc69f34214fb36a187cca46a.tar tor-be5aa47b55f8a140cc69f34214fb36a187cca46a.tar.gz |
Remove changes files already merged in 0.2.2.30-rc
Diffstat (limited to 'changes/bug3306')
-rw-r--r-- | changes/bug3306 | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/changes/bug3306 b/changes/bug3306 deleted file mode 100644 index f868a24af..000000000 --- a/changes/bug3306 +++ /dev/null @@ -1,9 +0,0 @@ - o Minor bugfixes: - - Make our crypto_rand_int() function check the value of its input - correctly. Previously, it accepted values up to UINT_MAX, but - could return a negative number if given a value above INT_MAX+1. - Found by George Kadianakis. Fixes bug 3306; bugfix on 0.2.2pre14. - - - Avoid a segfault when reading a malformed circuit build state - with more than INT_MAX entries. Found by wanoskarnet. Bugfix on - 0.2.2.4-alpha. |