Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Xmrig segfaults if fed password longer than 490 characters #757

Closed
mardarfar opened this issue Sep 19, 2018 · 1 comment
Closed

Xmrig segfaults if fed password longer than 490 characters #757

mardarfar opened this issue Sep 19, 2018 · 1 comment
Labels

Comments

@mardarfar
Copy link

mardarfar commented Sep 19, 2018

./xmrig -o pool.supportxmr.com:5555 -u 43QGgipcHvNLBX3nunZLwVQpF6VbobmGcQKzXzQ5xMfJgzfRBzfXcJHX1tUHcKPm9bcjubrzKqTm69JbQSL4B3f6E3mNCbU -p $(perl -e "print 'A' x 490")

  • VERSIONS XMRig/2.6.4 libuv/1.22.0 gcc/5.4.0
  • CPU Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz (1) x64 AES-NI
  • CPU L2/L3 1.0 MB/8.0 MB
  • THREADS 4, cryptonight, av=0, donate=5%
  • POOL 128tx exploit #1 pool.supportxmr.com:5555 variant 1
  • COMMANDS hashrate, pause, resume
    Segmentation fault

0x000000000047cc5f in Client::parseResponse(long, rapidjson::GenericValue<rapidjson::UTF8, rapidjson::MemoryPoolAllocatorrapidjson::CrtAllocator > const&,
rapidjson::GenericValue<rapidjson::UTF8, rapidjson::MemoryPoolAllocatorrapidjson::CrtAllocator > const&) ()

Using static build from https://github.com/xmrig/xmrig/releases/download/v2.6.4/xmrig-2.6.4-xenial-amd64.tar.gz on centos 7 3.10.0-862.9.1.el7.x86_64

@xmrig xmrig added the bug label Sep 20, 2018
@xmrig
Copy link
Owner

xmrig commented Sep 20, 2018

Fixed 0adad68. Fix will be included into next v2.8 release.
Thank you.

@xmrig xmrig added this to the v2.8 milestone Sep 22, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants