doors points out that if a SOCKS proxy sends a reply longer than 128 bytes, Tor may never parse the entire reply. (This can happen, for example, if a SOCKS proxy sends an absurdly long DOMAINNAME in the BND.ADDR field.)
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items
...
Show closed items
Linked items
0
Link issues together to show that they're related.
Learn more.
For the 'changes' file: This bug was introduced when the SOCKS client code was added, in commit 75472c19c3fdcda913eb8117c917ddfd445b2b77 (first released in version 0.2.2.1-alpha).
The patch should be based on maint-0.2.2, but a second patch will be needed on master (on top of the fix to #2327 (moved)) to fix the bufferevents SOCKS client code.
The most annoying part of fixing this will be calculating the maximum SOCKS reply length. See IETF RFC 1928 for the SOCKS 5 spec; I don't know where to find the SOCKS 4 spec.
and the longest possible length for BND.ADDR is 256 (one length byte, 255 hostname bytes), I think we're looking at 232 as the longest possible length for a socks reply. Let's round up to doing a pullup(512).