aboutsummaryrefslogtreecommitdiff
path: root/changes/bug6252_again
blob: f7fd00cb3858bb6cd3674b48f5b1e904dff9f1f3 (plain)
1
2
3
4
5
6
7
8
9
10
11
  o Security fixes:
    - Tear down the circuit if we get an unexpected SENDME cell. Clients
      could use this trick to make their circuits receive cells faster
      than our flow control would have allowed, or to gum up the network,
      or possibly to do targeted memory denial-of-service attacks on
      entry nodes. Fixes bug 6252. Bugfix on the 54th commit on Tor --
      from July 2002, before the release of Tor 0.0.0.  We had committed
      this patch previously, but we had to revert it because of bug 6271.
      Now that 6271 is fixed, this appears to work.