mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-28 06:13:31 +01:00
b5e6bbc01d
Back in #1240, r1eo linked to information about how this could happen with older Linux kernels in response to nmap. Bugs #4545 and #4547 are about how our approach to trying to deal with this condition was broken and stupid. Thanks to wanoskarnet for reminding us about #1240. This is a fix for the abovementioned bugs, and is a bugfix on 0.1.0.3-rc.
9 lines
499 B
Plaintext
9 lines
499 B
Plaintext
o Minor bugfixes:
|
|
- When running with an older Linux kernel that erroneously responds
|
|
to strange nmap behavior by having accept() return successfully
|
|
with a zero-length socket, just close the connection. Previously,
|
|
we would try harder to learn the remote address: but there was no
|
|
such remote address to learn, and our method for trying to learn
|
|
it was incorrect. Fixes bugs #1240, #4745, and #4747. Bugfix on
|
|
0.1.0.3-rc. Reported and diagnosed by "r1eo".
|