[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17779 [Tor]: Memory leak in routerkeys.c
#17779: Memory leak in routerkeys.c
------------------------------------+------------------------------------
Reporter: cypherpunks | Owner:
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.2.7.x-final
Component: Tor | Version: Tor: 0.2.7.2-alpha
Severity: Normal | Resolution:
Keywords: TorCoreTeam201512 easy | Actual Points:
Parent ID: | Points:
Sponsor: |
------------------------------------+------------------------------------
Changes (by teor):
* keywords: => TorCoreTeam201512 easy
Comment:
It would be great if we could fix this in December.
But we might want to think about how we do it - it appears that
get_master_rsa_crosscert is for generating RSA/ED cross-certificates.
Perhaps we can free the rsa_ed_crosscert variable in one of the functions
that cleans up Tor memory?
Do we expect that the rsa_ed_crosscert variable will ever change value? If
so, it needs to be freed before it's overwritten, too.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17779#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs