Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Xmrig segfaults if fed password longer than 490 characters #757

Closed
mardarfar opened this issue Sep 19, 2018 · 1 comment
Closed

Xmrig segfaults if fed password longer than 490 characters #757

mardarfar opened this issue Sep 19, 2018 · 1 comment
Labels

Comments

@mardarfar
Copy link

mardarfar commented Sep 19, 2018

./xmrig -o pool.supportxmr.com:5555 -u 43QGgipcHvNLBX3nunZLwVQpF6VbobmGcQKzXzQ5xMfJgzfRBzfXcJHX1tUHcKPm9bcjubrzKqTm69JbQSL4B3f6E3mNCbU -p $(perl -e "print 'A' x 490")

  • VERSIONS XMRig/2.6.4 libuv/1.22.0 gcc/5.4.0
  • CPU Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz (1) x64 AES-NI
  • CPU L2/L3 1.0 MB/8.0 MB
  • THREADS 4, cryptonight, av=0, donate=5%
  • POOL 128tx exploit #1 pool.supportxmr.com:5555 variant 1
  • COMMANDS hashrate, pause, resume
    Segmentation fault

0x000000000047cc5f in Client::parseResponse(long, rapidjson::GenericValue<rapidjson::UTF8, rapidjson::MemoryPoolAllocatorrapidjson::CrtAllocator > const&,
rapidjson::GenericValue<rapidjson::UTF8, rapidjson::MemoryPoolAllocatorrapidjson::CrtAllocator > const&) ()

Using static build from https://github.com/xmrig/xmrig/releases/download/v2.6.4/xmrig-2.6.4-xenial-amd64.tar.gz on centos 7 3.10.0-862.9.1.el7.x86_64

@xmrig xmrig added the bug label Sep 20, 2018
@xmrig
Copy link
Owner

xmrig commented Sep 20, 2018

Fixed 0adad68. Fix will be included into next v2.8 release.
Thank you.

@xmrig xmrig added this to the v2.8 milestone Sep 22, 2018
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants