diff options
author | anonimal <anonimal@getmonero.org> | 2019-03-09 09:11:44 +0000 |
---|---|---|
committer | moneromooo-monero <moneromooo-monero@users.noreply.github.com> | 2019-06-14 08:47:05 +0000 |
commit | 8f66b7053a8e4521fdd68c1d74718e73345fb158 (patch) | |
tree | b669995624bedf1c4377c32d1183dede4545434d /src/common/pod-class.h | |
parent | epee: basic sanity check on allocation size from untrusted source (diff) | |
download | monero-8f66b7053a8e4521fdd68c1d74718e73345fb158.tar.xz |
cryptonote_protocol_handler: prevent potential DoS
Essentially, one can send such a large amount of IDs that core exhausts
all free memory. This issue can theoretically be exploited using very
large CN blockchains, such as Monero.
This is a partial fix. Thanks and credit given to CryptoNote author
'cryptozoidberg' for collaboration and the fix. Also thanks to
'moneromooo'. Referencing HackerOne report #506595.
Diffstat (limited to 'src/common/pod-class.h')
0 files changed, 0 insertions, 0 deletions