From b792afa91901abaa04417051d1369fa8e643d90d Mon Sep 17 00:00:00 2001 From: Sebastian Hahn Date: Sun, 13 Sep 2009 21:47:55 +0200 Subject: Fix a memory leak when parsing a ns Adding the same vote to a networkstatus consensus leads to a memory leak on the client side. Fix that by only using the first vote from any given voter, and ignoring the others. Problem found by Rotor, who also helped writing the patch. Thanks! --- src/or/routerparse.c | 8 ++++++++ 1 file changed, 8 insertions(+) (limited to 'src') diff --git a/src/or/routerparse.c b/src/or/routerparse.c index 97dd20f4e3..189458ee1e 100644 --- a/src/or/routerparse.c +++ b/src/or/routerparse.c @@ -2509,6 +2509,14 @@ networkstatus_parse_vote_from_string(const char *s, const char **eos_out, } else { if (tok->object_size >= INT_MAX) goto err; + /* We already parsed a vote from this voter. Use the first one. */ + if (v->signature) { + log_fn(LOG_PROTOCOL_WARN, LD_DIR, "We received a networkstatus " + "that contains two votes from the same voter. Ignoring " + "the second vote."); + continue; + } + v->signature = tor_memdup(tok->object_body, tok->object_size); v->signature_len = (int) tok->object_size; } -- cgit v1.2.3-54-g00ecf