[tor-bugs] #24150 [Core Tor/Tor]: Memory leak in v3 hsdesc parsing with empty encrypted data.
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Nov 6 17:43:05 UTC 2017
#24150: Memory leak in v3 hsdesc parsing with empty encrypted data.
---------------------------------+------------------------------------
Reporter: nickm | Owner: nickm
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor: 0.3.2.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-hs, memory-leak | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
---------------------------------+------------------------------------
Changes (by dgoulet):
* status: needs_review => needs_revision
Comment:
The check with `encrypted_data_length_is_valid()` and
`tor_assert(encrypted_len > 0);` at the start of the function can't allow
`encrypted_len` to be equal to 0.
Did you meant `if (result_len == 0)` instead?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24150#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list