-
Notifications
You must be signed in to change notification settings - Fork 38.7k
Fix Memory Leak #2671
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix Memory Leak #2671
Conversation
|
Automatic sanity-testing: PASSED, see http://jenkins.bluematt.me/pull-tester/f584fc268e9efbfcfe524fc88b3a8cf818b2aff5 for binaries and test log. |
|
Can you be more detailed with your commit message like |
|
Automatic sanity-testing: PASSED, see http://jenkins.bluematt.me/pull-tester/e628e185fd524ffd8cf0f1bbd83d21f5e4bda2bb for binaries and test log. |
|
Alright, can you now please also squash those 3 commits into one. |
|
Don't know how to do that... On May 19, 2013, at 2:53 PM, Philip Kaufmann [email protected] wrote:
|
|
I'm just ensuring with my comments, that core devs will merge your commit :). |
|
Seems correct at first glance. I'd have to review the functions called in SetCompactSignature() before ACK'ing, to be 100% certain |
|
ACK |
|
I believe there is also a memory leak on Line 331 (same issue). I can roll that into this patch or create a new one. On May 19, 2013, at 3:29 PM, Pieter Wuille [email protected] wrote:
|
|
@bytemaster If there are more leaks in key.cpp it would be fine to have fixes in this pull for them IMHO. |
|
Automatic sanity-testing: PASSED, see http://jenkins.bluematt.me/pull-tester/173601705ccf189fd83e3854f71f6a872c6faeda for binaries and test log. |
|
Automatic sanity-testing: PASSED, see http://jenkins.bluematt.me/pull-tester/a9280652ce61ddbbecfe16e18e1e464bb1f5d34d for binaries and test log. |
|
ACK (though ideally we should be using RAII so that these kind of mistakes cannot be made) |
|
@bytemaster How did you find these problems, just by browsing the code of via some tool? |
|
I was using the source code as an example for creating my own ECC library. The real question is what kind of security implications are there? Could On Mon, May 20, 2013 at 11:34 AM, Philip Kaufmann
|
|
@bytemaster We only use key recovery for verifymessage (the manual message signing stuff), and we only sign in response to user/rpc request, never P2P. Unless I'm missing something here there is no such risk in these cases. (None the less— the fixes are fantastic and also point out the memleak testing I've been doing recently, which hasn't involved using sign message or creating transactions while under instrumentation, is inadequate. thanks!) |
|
CompactSignature is indeed only used for message signing, so there is no remote vulnerability. Also, see #2600, which does a large refactor of the key.cpp code (it moved EC_KEY into an internal RAII wrapper, though not EC_SIG) |
|
Wouldn't have hurt to pull this for 0.8.2 RC2 ;)? |
|
@Diapolo I'm not eager to pull a fix for a non-network triggerable leak that I can't (easily) reproduce right before a release. |
See Subject.