[tor-bugs] #17779 [Tor]: Memory leak in routerkeys.c

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Dec 8 13:53:54 UTC 2015


#17779: Memory leak in routerkeys.c
------------------------------------+------------------------------------
 Reporter:  cypherpunks             |          Owner:
     Type:  defect                  |         Status:  new
 Priority:  Medium                  |      Milestone:  Tor: 0.2.7.x-final
Component:  Tor                     |        Version:  Tor: 0.2.7.2-alpha
 Severity:  Normal                  |     Resolution:
 Keywords:  TorCoreTeam201512 easy  |  Actual Points:
Parent ID:                          |         Points:
  Sponsor:                          |
------------------------------------+------------------------------------
Changes (by teor):

 * keywords:   => TorCoreTeam201512 easy


Comment:

 It would be great if we could fix this in December.

 But we might want to think about how we do it - it appears that
 get_master_rsa_crosscert is for generating RSA/ED cross-certificates.

 Perhaps we can free the rsa_ed_crosscert variable in one of the functions
 that cleans up Tor memory?
 Do we expect that the rsa_ed_crosscert variable will ever change value? If
 so, it needs to be freed before it's overwritten, too.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17779#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list