mirror of
https://github.com/debauchee/barrier.git
synced 2026-05-15 14:16:02 -06:00
[GH-ISSUE #396] barriers memory leak when clients with duplicate names attempt to connect #315
Labels
No labels
HiDPI
bounty
bsd/freebsd
bsd/openbsd
bug
bug
build-infra
cantfix
critical
doc
duplicate
enhancement
fix-available
from git
from release
good first issue
help wanted
installer/package
invalid
linux
macOS
meta
needs testing
pull-request
query
question
regression
regression
v2.4.0
windows
wontfix
work-in-progress
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/barrier#315
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @OddBloke on GitHub (Aug 16, 2019).
Original GitHub issue: https://github.com/debauchee/barrier/issues/396
Originally assigned to: @shymega on GitHub.
Operating Systems
Server: Ubuntu 19.10
Client: Ubuntu 19.04, Ubuntu 19.04
Barrier Version
2.3.1+dfsg-1
Steps to reproduce bug
Other info
This is arguably a DOS attack vector from users on my network; if they know the names of my screens (which are just hostnames in my configuration, so not hard to work out), they can exhaust memory on the host running barriers.
@OddBloke commented on GitHub (Aug 16, 2019):
Here's some data gathered using this shell one-liner:
@noisyshape commented on GitHub (Aug 21, 2019):
Valgrind shows three separate leaks for each connection but they're relatively small. It does not show this leak. What seems to be happening is that socket objects are supposed to be deleted when the client disconnects but they actually hang around until the server cleans them up on exit.
@shymega commented on GitHub (Aug 21, 2019):
@noisyshape Could well be. I'll have a look.