[issue21324] dbhash leaks random memory fragments to a database
Jesús Cea Avión added the comment: I could be wrong, but I think this is an Oracle Berkeley DB bug. I contacted Oracle yesterday about this. Stand by. -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
Changes by Jesús Cea Avión j...@jcea.es: -- nosy: +jcea ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
Jesús Cea Avión added the comment: Marcin, what Berkeley DB version are you using?. Platform?. 32 or 64 bits? Could you be able to compile test a custom python patch? -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
Jesús Cea Avión added the comment: dbhash uses bsddb behind the curtain. Could you possibly try current bsddb external module at http://www.jcea.es/programacion/pybsddb.htm ?? Thanks. -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
Jesús Cea Avión added the comment: Experimenting with this, looks like the content leak is inside Berkeley DB code. The leak is always on offset X*4096 bytes away when the database pagesize is 4096 bytes. Looks like this is an important hint, since Python itself knows nothing about database pagesize. For instance: a=open(secrets.db).read() a.find(secret) 21184 a.find(secret,21185) 25280 25280-21184 4096 a.find(secret,25281) 37568 37568-25280 12288 12288/4096.0 3.0 -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
Jesús Cea Avión added the comment: The C version reuses buffers, so the content leak is less probable. Could you possibly change the buffer for a malloc/free pair and try again?. -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
New submission from Marcin Szewczyk: As stated in the subject. Example is in a remote Git repository: https://bitbucket.org/wodny/python-dbm-experiments/ It shows how some random data gets into the database (into some gaps between keys and values). There is also a C example which hasn't been caught on leaking. -- components: Library (Lib) messages: 216966 nosy: wodny priority: normal severity: normal status: open title: dbhash leaks random memory fragments to a database type: security versions: Python 2.7 ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com
[issue21324] dbhash leaks random memory fragments to a database
Changes by Jakub Wilk jw...@jwilk.net: -- nosy: +jwilk ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21324 ___ ___ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com