Commit Graph

8395 Commits

Author SHA1 Message Date
jw
aba46a7c5f Merge pull request #221 from wowario/upstream
Upstream and other stuff
v0.6.1.2
2019-06-26 06:57:43 -07:00
wowario
514328a65f update checkpoints.dat 2019-06-26 14:06:45 +03:00
wowario
172966a0c3 simplewallet: tone down not mining warning 2019-06-26 14:06:44 +03:00
wowario
815d93ba24 faster sync from 0 2019-06-26 14:06:44 +03:00
wowario
94abe2280e update Dockerfile 2019-06-23 20:28:16 +03:00
moneromooo-monero
556ec3c144 simplewallet: don't ask about mining when running a command line
This is likely to be done via a script
2019-06-23 12:01:44 +03:00
wowario
ec42fd80a1 update PKGBUILD 2019-06-23 12:01:44 +03:00
wowario
805781957a silent no incoming connections warning 2019-06-23 12:01:44 +03:00
wowario
03e49575a4 bump version to 0.6.1.2 2019-06-23 09:12:11 +03:00
wowario
4f262b2de9 set background mining to No 2019-06-23 09:09:39 +03:00
wowario
5563c65f64 rename to wownero 2019-06-23 09:05:11 +03:00
moneromooo-monero
adbb7229af blockchain_export: allow exporting blocks.dat format from pruned
We don't need any of the pruned data for this
2019-06-23 08:14:37 +03:00
moneromooo-monero
e49f7450d2 daemon: display peer address type in print_cn 2019-06-23 08:13:01 +03:00
moneromooo-monero
10593e20a5 tx_sanity_check: don't print an error when not enough outs to check 2019-06-23 08:11:47 +03:00
moneromooo-monero
517d5e6915 rpc: work around a GCC 7.4.0 (at least) bug
In static member function ‘static boost::optional<cryptonote::rpc::output_distribution_data> cryptonote::rpc::RpcHandler::get_output_distribution(const std::function<bool(long unsigned int, long unsigned int, long unsigned int, long unsigned int&, std::vector<long unsigned int>&, long unsigned int&)>&, uint64_t, uint64_t, uint64_t, const std::function<crypto::hash(long unsigned int)>&, bool, uint64_t)’:
cc1plus: warning: ‘void* __builtin_memset(void*, int, long unsigned int)’: specified size 18446744073709551536 exceeds maximum object size 9223372036854775807 [-Wstringop-overflow=]
2019-06-23 08:11:13 +03:00
moneromooo-monero
24bbd442a3 core: do not complain about low block rate if disconnected
In that case, we'll still keep the "Monero is now disconnected
from the network" near the end of the log
2019-06-23 08:10:25 +03:00
moneromooo-monero
f15de92f90 blockchain: silence an error getting blocks for pruned nodes
This happens often when a pre-pruning node asks a pruned node
for data it does not have
2019-06-23 08:08:55 +03:00
moneromooo-monero
2e9b9d92fc db_lmdb: commit pruning txn at checkpoints
to avoid errors when the txn is too large
2019-06-23 08:06:28 +03:00
moneromooo-monero
eb189153ca p2p: don't forget pruning seed or public RPC port when updating peers
Older nodes don't pass that information around
2019-06-23 08:06:00 +03:00
moneromooo-monero
6755e0d7f3 p2p: propagate out peers limit to payload handler 2019-06-23 08:04:26 +03:00
moneromooo-monero
d46fb70930 p2p: close the right number of connections on setting max in/out peers 2019-06-23 08:04:17 +03:00
moneromooo-monero
39e9fa05b8 core: fix --prune-blockchain not pruning if no blockchain exists 2019-06-23 08:00:10 +03:00
jw
9afbcfb777 Merge pull request #217 from wowario/wow
update RandomWOW submodule
2019-06-17 07:16:57 -07:00
moneromooo-monero
e6c875a954 rpc: restrict the recent cutoff size in restricted RPC mode 2019-06-17 12:35:03 +03:00
moneromooo-monero
12085c4c74 ensure no NULL is passed to memcpy
NULL is valid when size is 0, but memcpy uses nonnull attributes,
so let's not poke the bear
2019-06-17 12:34:54 +03:00
moneromooo-monero
2a5f743d0a abstract_tcp_server2: improve DoS resistance 2019-06-17 12:34:44 +03:00
moneromooo-monero
2fb6c1f80d serialization: check stream good flag at the end
just in case
2019-06-17 12:34:11 +03:00
moneromooo-monero
8ad9d0f618 tree-hash: allocate variable memory on heap, not stack
Large amounts might run out of stack

Reported by guidov
2019-06-17 12:30:40 +03:00
moneromooo-monero
ddafd99cac cryptonote: throw on tx hash calculation error 2019-06-17 12:30:31 +03:00
moneromooo-monero
26276d5df7 serialization: fail on read_varint error 2019-06-17 12:30:23 +03:00
moneromooo-monero
de536f49cb cryptonote_protocol: fix another potential P2P DoS
When asking for txes in a fluffy transaction, one might ask
for the same (large) tx many times
2019-06-17 12:30:16 +03:00
moneromooo-monero
3fdf63bc90 cryptonote_protocol: expand basic DoS protection
Count transactions as well
2019-06-17 12:30:07 +03:00
anonimal
2f402f9a45 cryptonote_protocol_handler: prevent potential DoS
Essentially, one can send such a large amount of IDs that core exhausts
all free memory. This issue can theoretically be exploited using very
large CN blockchains, such as Monero.

This is a partial fix. Thanks and credit given to CryptoNote author
'cryptozoidberg' for collaboration and the fix. Also thanks to
'moneromooo'. Referencing HackerOne report #506595.
2019-06-17 12:29:59 +03:00
moneromooo-monero
307bd8f5ae epee: basic sanity check on allocation size from untrusted source
Reported by guidov
2019-06-17 12:29:47 +03:00
wowario
bc3aa2ea12 update RandomWOW submodule 2019-06-17 10:48:13 +03:00
jw
94390f8364 Merge pull request #216 from wowario/upstream
Upstream
v0.6.1.1
2019-06-14 05:46:17 -07:00
jw
5249d14063 Merge pull request #215 from wowario/masterb
bump version to 0.6.1.1 and update checkpoints.dat
2019-06-14 05:46:05 -07:00
jw
9713b3f058 Merge pull request #214 from wowario/master
Fix Windows detection
2019-06-14 05:45:54 -07:00
jw
6f2d52de9e Merge pull request #213 from fuwa0529/fix-no-ring
[need testing] hotfix "no ring" error in wallet
2019-06-14 05:45:40 -07:00
jw
949158eb00 Merge pull request #212 from Aluisyo/patch-4
added super fast public node (wow.aluisyo.network)
2019-06-14 05:45:25 -07:00
Howard Chu
c749be7f9d Use 9 digit build IDs 2019-06-14 13:49:20 +03:00
Howard Chu
036cdfadad Delete redundant cppzmq dependency 2019-06-14 13:48:57 +03:00
Howard Chu
8670b67c9c Allow parallel make 2019-06-14 13:48:40 +03:00
Howard Chu
98f2524ecc Don't use -march=native 2019-06-14 13:48:26 +03:00
who-biz
a0b181f4cd [depends] update openssl to 1.0.2r
- This addresses https://www.openssl.org/news/secadv/20190226.txt (CVE: 2019-1559) which impacted all versions of openssl-1.0.

Note that this does not address CVE-2019-1543 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543), which impacts all versions of openssl 1.1 through 1.1.0j and 1.1.1b.

The above (1.1) is patched in openssl, where it was marked as low severity.  Similar issues possibly present in monero, should be looked into w.r.t. CVE-2019-1543.
2019-06-14 13:48:07 +03:00
moneromooo-monero
2ae11e8e4b cmake: do not use -mmitigate-rop on GCC >= 9.1
It was removed, but it still accepted by the compiler, which warns
for every file
2019-06-14 13:47:44 +03:00
moneromooo-monero
ae9de01824 Fix GCC 9.1 build warnings
GCC wants operator= aand copy ctor to be both defined, or neither
2019-06-14 13:47:11 +03:00
moneromooo-monero
5227b3280c p2p: fix GCC 9.1 crash 2019-06-14 13:46:56 +03:00
xiphon
ed34ba0774 epee: fix SSL autodetect on reconnection 2019-06-14 13:46:38 +03:00
ston1th
33634f6dfd miner: fix double free of thread attributes
issue: #5568
2019-06-14 13:45:07 +03:00